Oct  2 19:13:46.028014 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023
Oct  2 19:13:46.028038 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 19:13:46.028047 kernel: BIOS-provided physical RAM map:
Oct  2 19:13:46.028055 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable
Oct  2 19:13:46.028061 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved
Oct  2 19:13:46.028066 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable
Oct  2 19:13:46.028078 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved
Oct  2 19:13:46.028084 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data
Oct  2 19:13:46.028090 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS
Oct  2 19:13:46.028098 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable
Oct  2 19:13:46.028105 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable
Oct  2 19:13:46.028110 kernel: printk: bootconsole [earlyser0] enabled
Oct  2 19:13:46.028116 kernel: NX (Execute Disable) protection: active
Oct  2 19:13:46.028126 kernel: efi: EFI v2.70 by Microsoft
Oct  2 19:13:46.028135 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c9a98 RNG=0x3ffd1018 
Oct  2 19:13:46.028143 kernel: random: crng init done
Oct  2 19:13:46.028151 kernel: SMBIOS 3.1.0 present.
Oct  2 19:13:46.028157 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022
Oct  2 19:13:46.028164 kernel: Hypervisor detected: Microsoft Hyper-V
Oct  2 19:13:46.028173 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2
Oct  2 19:13:46.028179 kernel: Hyper-V Host Build:20348-10.0-1-0.1462
Oct  2 19:13:46.028185 kernel: Hyper-V: Nested features: 0x1e0101
Oct  2 19:13:46.028196 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40
Oct  2 19:13:46.028203 kernel: Hyper-V: Using hypercall for remote TLB flush
Oct  2 19:13:46.028212 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns
Oct  2 19:13:46.028219 kernel: tsc: Marking TSC unstable due to running on Hyper-V
Oct  2 19:13:46.028229 kernel: tsc: Detected 2593.906 MHz processor
Oct  2 19:13:46.028236 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Oct  2 19:13:46.028245 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Oct  2 19:13:46.028252 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000
Oct  2 19:13:46.028260 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Oct  2 19:13:46.028268 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved
Oct  2 19:13:46.028278 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000
Oct  2 19:13:46.028284 kernel: Using GB pages for direct mapping
Oct  2 19:13:46.028292 kernel: Secure boot disabled
Oct  2 19:13:46.028300 kernel: ACPI: Early table checksum verification disabled
Oct  2 19:13:46.028307 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL)
Oct  2 19:13:46.028314 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 19:13:46.028323 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 19:13:46.028329 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01   00000001 MSFT 05000000)
Oct  2 19:13:46.028344 kernel: ACPI: FACS 0x000000003FFFE000 000040
Oct  2 19:13:46.028351 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 19:13:46.028358 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 19:13:46.028366 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 19:13:46.028375 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 19:13:46.028382 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 19:13:46.028393 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 19:13:46.028401 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 19:13:46.028408 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113]
Oct  2 19:13:46.028419 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183]
Oct  2 19:13:46.028426 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f]
Oct  2 19:13:46.028433 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063]
Oct  2 19:13:46.028443 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f]
Oct  2 19:13:46.028450 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027]
Oct  2 19:13:46.028460 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057]
Oct  2 19:13:46.028469 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf]
Oct  2 19:13:46.028476 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037]
Oct  2 19:13:46.028484 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033]
Oct  2 19:13:46.028493 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Oct  2 19:13:46.028500 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0
Oct  2 19:13:46.028508 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug
Oct  2 19:13:46.028516 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug
Oct  2 19:13:46.028523 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug
Oct  2 19:13:46.028535 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug
Oct  2 19:13:46.028542 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug
Oct  2 19:13:46.028549 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug
Oct  2 19:13:46.028559 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug
Oct  2 19:13:46.028566 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug
Oct  2 19:13:46.028573 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug
Oct  2 19:13:46.028583 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug
Oct  2 19:13:46.028591 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug
Oct  2 19:13:46.028597 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug
Oct  2 19:13:46.028616 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug
Oct  2 19:13:46.028624 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug
Oct  2 19:13:46.028634 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug
Oct  2 19:13:46.028641 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug
Oct  2 19:13:46.028651 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff]
Oct  2 19:13:46.028659 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff]
Oct  2 19:13:46.028669 kernel: Zone ranges:
Oct  2 19:13:46.028677 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Oct  2 19:13:46.028687 kernel:   DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Oct  2 19:13:46.040310 kernel:   Normal   [mem 0x0000000100000000-0x00000002bfffffff]
Oct  2 19:13:46.040325 kernel: Movable zone start for each node
Oct  2 19:13:46.040336 kernel: Early memory node ranges
Oct  2 19:13:46.040343 kernel:   node   0: [mem 0x0000000000001000-0x000000000009ffff]
Oct  2 19:13:46.040352 kernel:   node   0: [mem 0x0000000000100000-0x000000003ff40fff]
Oct  2 19:13:46.040361 kernel:   node   0: [mem 0x000000003ffff000-0x000000003fffffff]
Oct  2 19:13:46.040368 kernel:   node   0: [mem 0x0000000100000000-0x00000002bfffffff]
Oct  2 19:13:46.040376 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff]
Oct  2 19:13:46.040385 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Oct  2 19:13:46.040400 kernel: On node 0, zone DMA: 96 pages in unavailable ranges
Oct  2 19:13:46.040407 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges
Oct  2 19:13:46.040417 kernel: ACPI: PM-Timer IO Port: 0x408
Oct  2 19:13:46.040425 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1])
Oct  2 19:13:46.040435 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23
Oct  2 19:13:46.040443 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Oct  2 19:13:46.040451 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Oct  2 19:13:46.040461 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200
Oct  2 19:13:46.040468 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs
Oct  2 19:13:46.040479 kernel: [mem 0x40000000-0xffffffff] available for PCI devices
Oct  2 19:13:46.040488 kernel: Booting paravirtualized kernel on Hyper-V
Oct  2 19:13:46.040495 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Oct  2 19:13:46.040505 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1
Oct  2 19:13:46.040513 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576
Oct  2 19:13:46.040520 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152
Oct  2 19:13:46.040530 kernel: pcpu-alloc: [0] 0 1 
Oct  2 19:13:46.040537 kernel: Hyper-V: PV spinlocks enabled
Oct  2 19:13:46.040544 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Oct  2 19:13:46.040556 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 2062618
Oct  2 19:13:46.040563 kernel: Policy zone: Normal
Oct  2 19:13:46.040573 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 19:13:46.040582 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Oct  2 19:13:46.040589 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear)
Oct  2 19:13:46.040596 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Oct  2 19:13:46.040606 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Oct  2 19:13:46.040621 kernel: Memory: 8073740K/8387460K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 313460K reserved, 0K cma-reserved)
Oct  2 19:13:46.040633 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Oct  2 19:13:46.040640 kernel: ftrace: allocating 34453 entries in 135 pages
Oct  2 19:13:46.040657 kernel: ftrace: allocated 135 pages with 4 groups
Oct  2 19:13:46.040667 kernel: rcu: Hierarchical RCU implementation.
Oct  2 19:13:46.040678 kernel: rcu:         RCU event tracing is enabled.
Oct  2 19:13:46.040686 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
Oct  2 19:13:46.040693 kernel:         Rude variant of Tasks RCU enabled.
Oct  2 19:13:46.040704 kernel:         Tracing variant of Tasks RCU enabled.
Oct  2 19:13:46.040711 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Oct  2 19:13:46.040720 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
Oct  2 19:13:46.040729 kernel: Using NULL legacy PIC
Oct  2 19:13:46.040738 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0
Oct  2 19:13:46.040749 kernel: Console: colour dummy device 80x25
Oct  2 19:13:46.040756 kernel: printk: console [tty1] enabled
Oct  2 19:13:46.040764 kernel: printk: console [ttyS0] enabled
Oct  2 19:13:46.040774 kernel: printk: bootconsole [earlyser0] disabled
Oct  2 19:13:46.040783 kernel: ACPI: Core revision 20210730
Oct  2 19:13:46.040794 kernel: Failed to register legacy timer interrupt
Oct  2 19:13:46.040802 kernel: APIC: Switch to symmetric I/O mode setup
Oct  2 19:13:46.040809 kernel: Hyper-V: Using IPI hypercalls
Oct  2 19:13:46.040820 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906)
Oct  2 19:13:46.040829 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Oct  2 19:13:46.040839 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Oct  2 19:13:46.040848 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Oct  2 19:13:46.040857 kernel: Spectre V2 : Mitigation: Retpolines
Oct  2 19:13:46.040866 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Oct  2 19:13:46.040876 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Oct  2 19:13:46.040885 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible!
Oct  2 19:13:46.040896 kernel: RETBleed: Vulnerable
Oct  2 19:13:46.040903 kernel: Speculative Store Bypass: Vulnerable
Oct  2 19:13:46.040910 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode
Oct  2 19:13:46.040920 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode
Oct  2 19:13:46.040928 kernel: GDS: Unknown: Dependent on hypervisor status
Oct  2 19:13:46.040935 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Oct  2 19:13:46.040944 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Oct  2 19:13:46.040954 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Oct  2 19:13:46.040964 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Oct  2 19:13:46.040974 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Oct  2 19:13:46.040981 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Oct  2 19:13:46.040990 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Oct  2 19:13:46.040999 kernel: x86/fpu: xstate_offset[5]:  832, xstate_sizes[5]:   64
Oct  2 19:13:46.041006 kernel: x86/fpu: xstate_offset[6]:  896, xstate_sizes[6]:  512
Oct  2 19:13:46.041016 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024
Oct  2 19:13:46.041024 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format.
Oct  2 19:13:46.041031 kernel: Freeing SMP alternatives memory: 32K
Oct  2 19:13:46.041041 kernel: pid_max: default: 32768 minimum: 301
Oct  2 19:13:46.041048 kernel: LSM: Security Framework initializing
Oct  2 19:13:46.041056 kernel: SELinux:  Initializing.
Oct  2 19:13:46.041068 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear)
Oct  2 19:13:46.041075 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear)
Oct  2 19:13:46.041086 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7)
Oct  2 19:13:46.041094 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Oct  2 19:13:46.041101 kernel: signal: max sigframe size: 3632
Oct  2 19:13:46.041111 kernel: rcu: Hierarchical SRCU implementation.
Oct  2 19:13:46.041119 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Oct  2 19:13:46.041127 kernel: smp: Bringing up secondary CPUs ...
Oct  2 19:13:46.041136 kernel: x86: Booting SMP configuration:
Oct  2 19:13:46.041144 kernel: .... node  #0, CPUs:      #1
Oct  2 19:13:46.041156 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.
Oct  2 19:13:46.041165 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Oct  2 19:13:46.041173 kernel: smp: Brought up 1 node, 2 CPUs
Oct  2 19:13:46.041182 kernel: smpboot: Max logical packages: 1
Oct  2 19:13:46.041190 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS)
Oct  2 19:13:46.041199 kernel: devtmpfs: initialized
Oct  2 19:13:46.041208 kernel: x86/mm: Memory block size: 128MB
Oct  2 19:13:46.041215 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes)
Oct  2 19:13:46.041228 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Oct  2 19:13:46.041235 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear)
Oct  2 19:13:46.041243 kernel: pinctrl core: initialized pinctrl subsystem
Oct  2 19:13:46.041253 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Oct  2 19:13:46.041262 kernel: audit: initializing netlink subsys (disabled)
Oct  2 19:13:46.041271 kernel: audit: type=2000 audit(1696274025.023:1): state=initialized audit_enabled=0 res=1
Oct  2 19:13:46.041280 kernel: thermal_sys: Registered thermal governor 'step_wise'
Oct  2 19:13:46.041289 kernel: thermal_sys: Registered thermal governor 'user_space'
Oct  2 19:13:46.041299 kernel: cpuidle: using governor menu
Oct  2 19:13:46.041309 kernel: ACPI: bus type PCI registered
Oct  2 19:13:46.041318 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Oct  2 19:13:46.041329 kernel: dca service started, version 1.12.1
Oct  2 19:13:46.041336 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Oct  2 19:13:46.041345 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Oct  2 19:13:46.041355 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Oct  2 19:13:46.041362 kernel: ACPI: Added _OSI(Module Device)
Oct  2 19:13:46.041371 kernel: ACPI: Added _OSI(Processor Device)
Oct  2 19:13:46.041379 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Oct  2 19:13:46.041389 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Oct  2 19:13:46.041399 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Oct  2 19:13:46.041407 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Oct  2 19:13:46.041417 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Oct  2 19:13:46.041426 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Oct  2 19:13:46.041438 kernel: ACPI: Interpreter enabled
Oct  2 19:13:46.041445 kernel: ACPI: PM: (supports S0 S5)
Oct  2 19:13:46.041457 kernel: ACPI: Using IOAPIC for interrupt routing
Oct  2 19:13:46.041466 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Oct  2 19:13:46.041478 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F
Oct  2 19:13:46.041488 kernel: iommu: Default domain type: Translated 
Oct  2 19:13:46.041497 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Oct  2 19:13:46.041506 kernel: vgaarb: loaded
Oct  2 19:13:46.041515 kernel: pps_core: LinuxPPS API ver. 1 registered
Oct  2 19:13:46.041524 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Oct  2 19:13:46.041534 kernel: PTP clock support registered
Oct  2 19:13:46.041542 kernel: Registered efivars operations
Oct  2 19:13:46.041551 kernel: PCI: Using ACPI for IRQ routing
Oct  2 19:13:46.041561 kernel: PCI: System does not support PCI
Oct  2 19:13:46.041571 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page
Oct  2 19:13:46.041578 kernel: VFS: Disk quotas dquot_6.6.0
Oct  2 19:13:46.041589 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Oct  2 19:13:46.041597 kernel: pnp: PnP ACPI init
Oct  2 19:13:46.041606 kernel: pnp: PnP ACPI: found 3 devices
Oct  2 19:13:46.041628 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Oct  2 19:13:46.041637 kernel: NET: Registered PF_INET protocol family
Oct  2 19:13:46.041649 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Oct  2 19:13:46.041662 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear)
Oct  2 19:13:46.041670 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Oct  2 19:13:46.041679 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear)
Oct  2 19:13:46.041686 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear)
Oct  2 19:13:46.041694 kernel: TCP: Hash tables configured (established 65536 bind 65536)
Oct  2 19:13:46.041701 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear)
Oct  2 19:13:46.041708 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear)
Oct  2 19:13:46.041716 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Oct  2 19:13:46.041723 kernel: NET: Registered PF_XDP protocol family
Oct  2 19:13:46.041732 kernel: PCI: CLS 0 bytes, default 64
Oct  2 19:13:46.041739 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Oct  2 19:13:46.041747 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB)
Oct  2 19:13:46.041757 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Oct  2 19:13:46.041765 kernel: Initialise system trusted keyrings
Oct  2 19:13:46.041774 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0
Oct  2 19:13:46.041783 kernel: Key type asymmetric registered
Oct  2 19:13:46.041792 kernel: Asymmetric key parser 'x509' registered
Oct  2 19:13:46.041800 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Oct  2 19:13:46.041812 kernel: io scheduler mq-deadline registered
Oct  2 19:13:46.041820 kernel: io scheduler kyber registered
Oct  2 19:13:46.041830 kernel: io scheduler bfq registered
Oct  2 19:13:46.041839 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Oct  2 19:13:46.041850 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Oct  2 19:13:46.041858 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Oct  2 19:13:46.041869 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Oct  2 19:13:46.041880 kernel: i8042: PNP: No PS/2 controller found.
Oct  2 19:13:46.042034 kernel: rtc_cmos 00:02: registered as rtc0
Oct  2 19:13:46.042128 kernel: rtc_cmos 00:02: setting system clock to 2023-10-02T19:13:45 UTC (1696274025)
Oct  2 19:13:46.042209 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram
Oct  2 19:13:46.042220 kernel: fail to initialize ptp_kvm
Oct  2 19:13:46.042228 kernel: intel_pstate: CPU model not supported
Oct  2 19:13:46.042238 kernel: efifb: probing for efifb
Oct  2 19:13:46.042246 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k
Oct  2 19:13:46.042256 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1
Oct  2 19:13:46.042263 kernel: efifb: scrolling: redraw
Oct  2 19:13:46.042277 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
Oct  2 19:13:46.042284 kernel: Console: switching to colour frame buffer device 128x48
Oct  2 19:13:46.042295 kernel: fb0: EFI VGA frame buffer device
Oct  2 19:13:46.042302 kernel: pstore: Registered efi as persistent store backend
Oct  2 19:13:46.042311 kernel: NET: Registered PF_INET6 protocol family
Oct  2 19:13:46.042320 kernel: Segment Routing with IPv6
Oct  2 19:13:46.042330 kernel: In-situ OAM (IOAM) with IPv6
Oct  2 19:13:46.042338 kernel: NET: Registered PF_PACKET protocol family
Oct  2 19:13:46.042346 kernel: Key type dns_resolver registered
Oct  2 19:13:46.042358 kernel: IPI shorthand broadcast: enabled
Oct  2 19:13:46.042366 kernel: sched_clock: Marking stable (779374300, 22929700)->(1011059700, -208755700)
Oct  2 19:13:46.042375 kernel: registered taskstats version 1
Oct  2 19:13:46.042383 kernel: Loading compiled-in X.509 certificates
Oct  2 19:13:46.042392 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861'
Oct  2 19:13:46.042400 kernel: Key type .fscrypt registered
Oct  2 19:13:46.042409 kernel: Key type fscrypt-provisioning registered
Oct  2 19:13:46.042418 kernel: pstore: Using crash dump compression: deflate
Oct  2 19:13:46.042428 kernel: ima: No TPM chip found, activating TPM-bypass!
Oct  2 19:13:46.042438 kernel: ima: Allocated hash algorithm: sha1
Oct  2 19:13:46.042446 kernel: ima: No architecture policies found
Oct  2 19:13:46.042456 kernel: Freeing unused kernel image (initmem) memory: 45372K
Oct  2 19:13:46.042463 kernel: Write protecting the kernel read-only data: 28672k
Oct  2 19:13:46.042473 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Oct  2 19:13:46.042482 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K
Oct  2 19:13:46.042492 kernel: Run /init as init process
Oct  2 19:13:46.042499 kernel:   with arguments:
Oct  2 19:13:46.042507 kernel:     /init
Oct  2 19:13:46.042519 kernel:   with environment:
Oct  2 19:13:46.042528 kernel:     HOME=/
Oct  2 19:13:46.042536 kernel:     TERM=linux
Oct  2 19:13:46.042543 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Oct  2 19:13:46.042555 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 19:13:46.042567 systemd[1]: Detected virtualization microsoft.
Oct  2 19:13:46.042576 systemd[1]: Detected architecture x86-64.
Oct  2 19:13:46.042586 systemd[1]: Running in initrd.
Oct  2 19:13:46.042596 systemd[1]: No hostname configured, using default hostname.
Oct  2 19:13:46.042605 systemd[1]: Hostname set to <localhost>.
Oct  2 19:13:46.042629 systemd[1]: Initializing machine ID from random generator.
Oct  2 19:13:46.042638 systemd[1]: Queued start job for default target initrd.target.
Oct  2 19:13:46.042648 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 19:13:46.042657 systemd[1]: Reached target cryptsetup.target.
Oct  2 19:13:46.042665 systemd[1]: Reached target paths.target.
Oct  2 19:13:46.042675 systemd[1]: Reached target slices.target.
Oct  2 19:13:46.042687 systemd[1]: Reached target swap.target.
Oct  2 19:13:46.042696 systemd[1]: Reached target timers.target.
Oct  2 19:13:46.042704 systemd[1]: Listening on iscsid.socket.
Oct  2 19:13:46.042715 systemd[1]: Listening on iscsiuio.socket.
Oct  2 19:13:46.042724 systemd[1]: Listening on systemd-journald-audit.socket.
Oct  2 19:13:46.042733 systemd[1]: Listening on systemd-journald-dev-log.socket.
Oct  2 19:13:46.042741 systemd[1]: Listening on systemd-journald.socket.
Oct  2 19:13:46.042754 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 19:13:46.042763 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 19:13:46.042772 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 19:13:46.042780 systemd[1]: Reached target sockets.target.
Oct  2 19:13:46.042792 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 19:13:46.042800 systemd[1]: Finished network-cleanup.service.
Oct  2 19:13:46.042811 systemd[1]: Starting systemd-fsck-usr.service...
Oct  2 19:13:46.042818 systemd[1]: Starting systemd-journald.service...
Oct  2 19:13:46.042828 systemd[1]: Starting systemd-modules-load.service...
Oct  2 19:13:46.042839 systemd[1]: Starting systemd-resolved.service...
Oct  2 19:13:46.042850 systemd[1]: Starting systemd-vconsole-setup.service...
Oct  2 19:13:46.042858 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 19:13:46.042867 kernel: audit: type=1130 audit(1696274026.041:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.042880 systemd-journald[183]: Journal started
Oct  2 19:13:46.042929 systemd-journald[183]: Runtime Journal (/run/log/journal/b8f433bcc85b40adae6924cfff56e5f5) is 8.0M, max 159.0M, 151.0M free.
Oct  2 19:13:46.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.056933 systemd[1]: Started systemd-journald.service.
Oct  2 19:13:46.056952 systemd-modules-load[184]: Inserted module 'overlay'
Oct  2 19:13:46.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.088628 kernel: audit: type=1130 audit(1696274026.075:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.088846 systemd[1]: Finished systemd-fsck-usr.service.
Oct  2 19:13:46.101491 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Oct  2 19:13:46.101525 kernel: Bridge firewalling registered
Oct  2 19:13:46.092389 systemd-resolved[185]: Positive Trust Anchors:
Oct  2 19:13:46.092398 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 19:13:46.092432 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 19:13:46.155369 kernel: SCSI subsystem initialized
Oct  2 19:13:46.155416 kernel: audit: type=1130 audit(1696274026.103:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.095058 systemd-resolved[185]: Defaulting to hostname 'linux'.
Oct  2 19:13:46.192220 kernel: audit: type=1130 audit(1696274026.106:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.192242 kernel: audit: type=1130 audit(1696274026.106:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.102074 systemd-modules-load[184]: Inserted module 'br_netfilter'
Oct  2 19:13:46.203061 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Oct  2 19:13:46.203087 kernel: device-mapper: uevent: version 1.0.3
Oct  2 19:13:46.104514 systemd[1]: Started systemd-resolved.service.
Oct  2 19:13:46.209622 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Oct  2 19:13:46.107065 systemd[1]: Finished systemd-vconsole-setup.service.
Oct  2 19:13:46.109545 systemd[1]: Reached target nss-lookup.target.
Oct  2 19:13:46.112957 systemd[1]: Starting dracut-cmdline-ask.service...
Oct  2 19:13:46.137026 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Oct  2 19:13:46.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.180566 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Oct  2 19:13:46.249339 kernel: audit: type=1130 audit(1696274026.217:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.249360 kernel: audit: type=1130 audit(1696274026.233:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.214124 systemd-modules-load[184]: Inserted module 'dm_multipath'
Oct  2 19:13:46.218879 systemd[1]: Finished systemd-modules-load.service.
Oct  2 19:13:46.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.233709 systemd[1]: Finished dracut-cmdline-ask.service.
Oct  2 19:13:46.269967 kernel: audit: type=1130 audit(1696274026.251:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.265176 systemd[1]: Starting dracut-cmdline.service...
Oct  2 19:13:46.288837 dracut-cmdline[202]: dracut-dracut-053
Oct  2 19:13:46.288837 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA
Oct  2 19:13:46.288837 dracut-cmdline[202]: BEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 19:13:46.300280 systemd[1]: Starting systemd-sysctl.service...
Oct  2 19:13:46.302857 systemd[1]: Finished systemd-sysctl.service.
Oct  2 19:13:46.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.330627 kernel: audit: type=1130 audit(1696274026.316:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.361626 kernel: Loading iSCSI transport class v2.0-870.
Oct  2 19:13:46.374629 kernel: iscsi: registered transport (tcp)
Oct  2 19:13:46.399262 kernel: iscsi: registered transport (qla4xxx)
Oct  2 19:13:46.399319 kernel: QLogic iSCSI HBA Driver
Oct  2 19:13:46.428124 systemd[1]: Finished dracut-cmdline.service.
Oct  2 19:13:46.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.433596 systemd[1]: Starting dracut-pre-udev.service...
Oct  2 19:13:46.483634 kernel: raid6: avx512x4 gen() 18650 MB/s
Oct  2 19:13:46.503627 kernel: raid6: avx512x4 xor()  8093 MB/s
Oct  2 19:13:46.523623 kernel: raid6: avx512x2 gen() 18612 MB/s
Oct  2 19:13:46.543628 kernel: raid6: avx512x2 xor() 29829 MB/s
Oct  2 19:13:46.563622 kernel: raid6: avx512x1 gen() 18521 MB/s
Oct  2 19:13:46.583624 kernel: raid6: avx512x1 xor() 26977 MB/s
Oct  2 19:13:46.605621 kernel: raid6: avx2x4   gen() 18487 MB/s
Oct  2 19:13:46.625622 kernel: raid6: avx2x4   xor()  7952 MB/s
Oct  2 19:13:46.645621 kernel: raid6: avx2x2   gen() 18486 MB/s
Oct  2 19:13:46.666626 kernel: raid6: avx2x2   xor() 22249 MB/s
Oct  2 19:13:46.686620 kernel: raid6: avx2x1   gen() 14049 MB/s
Oct  2 19:13:46.706623 kernel: raid6: avx2x1   xor() 19437 MB/s
Oct  2 19:13:46.727618 kernel: raid6: sse2x4   gen() 11734 MB/s
Oct  2 19:13:46.747621 kernel: raid6: sse2x4   xor()  7286 MB/s
Oct  2 19:13:46.767623 kernel: raid6: sse2x2   gen() 12905 MB/s
Oct  2 19:13:46.787626 kernel: raid6: sse2x2   xor()  7725 MB/s
Oct  2 19:13:46.807623 kernel: raid6: sse2x1   gen() 11629 MB/s
Oct  2 19:13:46.831252 kernel: raid6: sse2x1   xor()  5927 MB/s
Oct  2 19:13:46.831279 kernel: raid6: using algorithm avx512x4 gen() 18650 MB/s
Oct  2 19:13:46.831292 kernel: raid6: .... xor() 8093 MB/s, rmw enabled
Oct  2 19:13:46.837798 kernel: raid6: using avx512x2 recovery algorithm
Oct  2 19:13:46.853636 kernel: xor: automatically using best checksumming function   avx       
Oct  2 19:13:46.947636 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Oct  2 19:13:46.956059 systemd[1]: Finished dracut-pre-udev.service.
Oct  2 19:13:46.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.960000 audit: BPF prog-id=7 op=LOAD
Oct  2 19:13:46.960000 audit: BPF prog-id=8 op=LOAD
Oct  2 19:13:46.961366 systemd[1]: Starting systemd-udevd.service...
Oct  2 19:13:46.975662 systemd-udevd[383]: Using default interface naming scheme 'v252'.
Oct  2 19:13:46.980329 systemd[1]: Started systemd-udevd.service.
Oct  2 19:13:46.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:46.986388 systemd[1]: Starting dracut-pre-trigger.service...
Oct  2 19:13:47.004624 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation
Oct  2 19:13:47.034318 systemd[1]: Finished dracut-pre-trigger.service.
Oct  2 19:13:47.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:47.037429 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 19:13:47.074909 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 19:13:47.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:47.119633 kernel: cryptd: max_cpu_qlen set to 1000
Oct  2 19:13:47.147839 kernel: hv_vmbus: Vmbus version:5.2
Oct  2 19:13:47.151630 kernel: hv_vmbus: registering driver hyperv_keyboard
Oct  2 19:13:47.152633 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0
Oct  2 19:13:47.162652 kernel: AVX2 version of gcm_enc/dec engaged.
Oct  2 19:13:47.162695 kernel: AES CTR mode by8 optimization enabled
Oct  2 19:13:47.165630 kernel: hv_vmbus: registering driver hv_netvsc
Oct  2 19:13:47.178641 kernel: hv_vmbus: registering driver hv_storvsc
Oct  2 19:13:47.181791 kernel: scsi host0: storvsc_host_t
Oct  2 19:13:47.182766 kernel: scsi 0:0:0:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct  2 19:13:47.183625 kernel: scsi 0:0:0:2: CD-ROM            Msft     Virtual DVD-ROM  1.0  PQ: 0 ANSI: 0
Oct  2 19:13:47.183680 kernel: hid: raw HID events driver (C) Jiri Kosina
Oct  2 19:13:47.183702 kernel: scsi host1: storvsc_host_t
Oct  2 19:13:47.231630 kernel: hv_vmbus: registering driver hid_hyperv
Oct  2 19:13:47.235632 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1
Oct  2 19:13:47.235677 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on 
Oct  2 19:13:47.262634 kernel: sr 0:0:0:2: [sr0] scsi-1 drive
Oct  2 19:13:47.262859 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20
Oct  2 19:13:47.274221 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB)
Oct  2 19:13:47.274425 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks
Oct  2 19:13:47.274548 kernel: sd 0:0:0:0: [sda] Write Protect is off
Oct  2 19:13:47.281558 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00
Oct  2 19:13:47.281802 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA
Oct  2 19:13:47.282633 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0
Oct  2 19:13:47.288628 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 19:13:47.292627 kernel: sd 0:0:0:0: [sda] Attached SCSI disk
Oct  2 19:13:47.401252 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: VF slot 1 added
Oct  2 19:13:47.411724 kernel: hv_vmbus: registering driver hv_pci
Oct  2 19:13:47.417625 kernel: hv_pci dc06534c-6813-4eb4-b850-db5bfb6a5e2d: PCI VMBus probing: Using version 0x10004
Oct  2 19:13:47.429746 kernel: hv_pci dc06534c-6813-4eb4-b850-db5bfb6a5e2d: PCI host bridge to bus 6813:00
Oct  2 19:13:47.429913 kernel: pci_bus 6813:00: root bus resource [mem 0xfe0000000-0xfe00fffff window]
Oct  2 19:13:47.430048 kernel: pci_bus 6813:00: No busn resource found for root bus, will use [bus 00-ff]
Oct  2 19:13:47.440950 kernel: pci 6813:00:02.0: [15b3:1016] type 00 class 0x020000
Oct  2 19:13:47.448678 kernel: pci 6813:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref]
Oct  2 19:13:47.471419 kernel: pci 6813:00:02.0: enabling Extended Tags
Oct  2 19:13:47.486625 kernel: pci 6813:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 6813:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link)
Oct  2 19:13:47.486860 kernel: pci_bus 6813:00: busn_res: [bus 00-ff] end is updated to 00
Oct  2 19:13:47.495891 kernel: pci 6813:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref]
Oct  2 19:13:47.594665 kernel: mlx5_core 6813:00:02.0: firmware version: 14.30.1224
Oct  2 19:13:47.652732 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Oct  2 19:13:47.665628 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (435)
Oct  2 19:13:47.686184 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 19:13:47.765632 kernel: mlx5_core 6813:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0)
Oct  2 19:13:47.872323 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Oct  2 19:13:47.875237 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Oct  2 19:13:47.889336 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Oct  2 19:13:47.895446 systemd[1]: Starting disk-uuid.service...
Oct  2 19:13:47.915632 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 19:13:47.929251 kernel: mlx5_core 6813:00:02.0: Supported tc offload range - chains: 1, prios: 1
Oct  2 19:13:47.929462 kernel: mlx5_core 6813:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing
Oct  2 19:13:47.929588 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 19:13:47.949349 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: VF registering: eth1
Oct  2 19:13:47.949516 kernel: mlx5_core 6813:00:02.0 eth1: joined to eth0
Oct  2 19:13:47.962637 kernel: mlx5_core 6813:00:02.0 enP26643s1: renamed from eth1
Oct  2 19:13:48.926636 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 19:13:48.928272 disk-uuid[552]: The operation has completed successfully.
Oct  2 19:13:49.002785 systemd[1]: disk-uuid.service: Deactivated successfully.
Oct  2 19:13:49.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.002887 systemd[1]: Finished disk-uuid.service.
Oct  2 19:13:49.014265 systemd[1]: Starting verity-setup.service...
Oct  2 19:13:49.050634 kernel: device-mapper: verity: sha256 using implementation "sha256-generic"
Oct  2 19:13:49.329816 systemd[1]: Found device dev-mapper-usr.device.
Oct  2 19:13:49.334324 systemd[1]: Finished verity-setup.service.
Oct  2 19:13:49.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.344422 systemd[1]: Mounting sysusr-usr.mount...
Oct  2 19:13:49.424625 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Oct  2 19:13:49.424871 systemd[1]: Mounted sysusr-usr.mount.
Oct  2 19:13:49.428765 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Oct  2 19:13:49.433247 systemd[1]: Starting ignition-setup.service...
Oct  2 19:13:49.438366 systemd[1]: Starting parse-ip-for-networkd.service...
Oct  2 19:13:49.459672 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 19:13:49.459726 kernel: BTRFS info (device sda6): using free space tree
Oct  2 19:13:49.459745 kernel: BTRFS info (device sda6): has skinny extents
Oct  2 19:13:49.506381 systemd[1]: Finished parse-ip-for-networkd.service.
Oct  2 19:13:49.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.510000 audit: BPF prog-id=9 op=LOAD
Oct  2 19:13:49.512197 systemd[1]: Starting systemd-networkd.service...
Oct  2 19:13:49.521382 systemd[1]: mnt-oem.mount: Deactivated successfully.
Oct  2 19:13:49.539543 systemd-networkd[797]: lo: Link UP
Oct  2 19:13:49.539552 systemd-networkd[797]: lo: Gained carrier
Oct  2 19:13:49.543685 systemd-networkd[797]: Enumeration completed
Oct  2 19:13:49.543778 systemd[1]: Started systemd-networkd.service.
Oct  2 19:13:49.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.549808 systemd[1]: Reached target network.target.
Oct  2 19:13:49.550940 systemd-networkd[797]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 19:13:49.557836 systemd[1]: Starting iscsiuio.service...
Oct  2 19:13:49.566434 systemd[1]: Started iscsiuio.service.
Oct  2 19:13:49.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.569940 systemd[1]: Starting iscsid.service...
Oct  2 19:13:49.575570 iscsid[803]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 19:13:49.575570 iscsid[803]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Oct  2 19:13:49.575570 iscsid[803]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Oct  2 19:13:49.575570 iscsid[803]: If using hardware iscsi like qla4xxx this message can be ignored.
Oct  2 19:13:49.575570 iscsid[803]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 19:13:49.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.613700 iscsid[803]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Oct  2 19:13:49.577156 systemd[1]: Started iscsid.service.
Oct  2 19:13:49.581784 systemd[1]: Starting dracut-initqueue.service...
Oct  2 19:13:49.596326 systemd[1]: Finished dracut-initqueue.service.
Oct  2 19:13:49.600762 systemd[1]: Reached target remote-fs-pre.target.
Oct  2 19:13:49.634041 kernel: mlx5_core 6813:00:02.0 enP26643s1: Link up
Oct  2 19:13:49.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.606125 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 19:13:49.611598 systemd[1]: Reached target remote-fs.target.
Oct  2 19:13:49.614626 systemd[1]: Starting dracut-pre-mount.service...
Oct  2 19:13:49.626469 systemd[1]: Finished dracut-pre-mount.service.
Oct  2 19:13:49.647025 systemd[1]: Finished ignition-setup.service.
Oct  2 19:13:49.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:49.651870 systemd[1]: Starting ignition-fetch-offline.service...
Oct  2 19:13:49.713772 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: Data path switched to VF: enP26643s1
Oct  2 19:13:49.714062 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 19:13:49.714434 systemd-networkd[797]: enP26643s1: Link UP
Oct  2 19:13:49.714693 systemd-networkd[797]: eth0: Link UP
Oct  2 19:13:49.714846 systemd-networkd[797]: eth0: Gained carrier
Oct  2 19:13:49.724762 systemd-networkd[797]: enP26643s1: Gained carrier
Oct  2 19:13:49.751707 systemd-networkd[797]: eth0: DHCPv4 address 10.200.8.37/24, gateway 10.200.8.1 acquired from 168.63.129.16
Oct  2 19:13:51.366864 systemd-networkd[797]: eth0: Gained IPv6LL
Oct  2 19:13:52.913920 ignition[819]: Ignition 2.14.0
Oct  2 19:13:52.913936 ignition[819]: Stage: fetch-offline
Oct  2 19:13:52.914036 ignition[819]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:13:52.914100 ignition[819]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 19:13:53.133329 ignition[819]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 19:13:53.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.134770 systemd[1]: Finished ignition-fetch-offline.service.
Oct  2 19:13:53.158900 kernel: kauditd_printk_skb: 18 callbacks suppressed
Oct  2 19:13:53.158932 kernel: audit: type=1130 audit(1696274033.139:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.133533 ignition[819]: parsed url from cmdline: ""
Oct  2 19:13:53.140843 systemd[1]: Starting ignition-fetch.service...
Oct  2 19:13:53.133537 ignition[819]: no config URL provided
Oct  2 19:13:53.133542 ignition[819]: reading system config file "/usr/lib/ignition/user.ign"
Oct  2 19:13:53.133550 ignition[819]: no config at "/usr/lib/ignition/user.ign"
Oct  2 19:13:53.133556 ignition[819]: failed to fetch config: resource requires networking
Oct  2 19:13:53.133892 ignition[819]: Ignition finished successfully
Oct  2 19:13:53.148884 ignition[825]: Ignition 2.14.0
Oct  2 19:13:53.148891 ignition[825]: Stage: fetch
Oct  2 19:13:53.148985 ignition[825]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:13:53.149009 ignition[825]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 19:13:53.152444 ignition[825]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 19:13:53.153462 ignition[825]: parsed url from cmdline: ""
Oct  2 19:13:53.153469 ignition[825]: no config URL provided
Oct  2 19:13:53.153488 ignition[825]: reading system config file "/usr/lib/ignition/user.ign"
Oct  2 19:13:53.153499 ignition[825]: no config at "/usr/lib/ignition/user.ign"
Oct  2 19:13:53.153542 ignition[825]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1
Oct  2 19:13:53.184486 ignition[825]: GET result: OK
Oct  2 19:13:53.187113 ignition[825]: config has been read from IMDS userdata
Oct  2 19:13:53.193698 ignition[825]: parsing config with SHA512: f42fbc834f09b1cb481c8bfd63dc9edb017f29260d73d278f6546ba8ceb04e5beadaa0a17dd85aacb6253e2bedb885ae51f1e6ab060a22bd9ea245d82fc9cedb
Oct  2 19:13:53.213119 unknown[825]: fetched base config from "system"
Oct  2 19:13:53.213134 unknown[825]: fetched base config from "system"
Oct  2 19:13:53.213656 ignition[825]: fetch: fetch complete
Oct  2 19:13:53.213143 unknown[825]: fetched user config from "azure"
Oct  2 19:13:53.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.213661 ignition[825]: fetch: fetch passed
Oct  2 19:13:53.241796 kernel: audit: type=1130 audit(1696274033.221:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.218857 systemd[1]: Finished ignition-fetch.service.
Oct  2 19:13:53.213700 ignition[825]: Ignition finished successfully
Oct  2 19:13:53.222848 systemd[1]: Starting ignition-kargs.service...
Oct  2 19:13:53.253054 ignition[831]: Ignition 2.14.0
Oct  2 19:13:53.253065 ignition[831]: Stage: kargs
Oct  2 19:13:53.253184 ignition[831]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:13:53.253210 ignition[831]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 19:13:53.257991 ignition[831]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 19:13:53.260174 ignition[831]: kargs: kargs passed
Oct  2 19:13:53.262446 systemd[1]: Finished ignition-kargs.service.
Oct  2 19:13:53.260220 ignition[831]: Ignition finished successfully
Oct  2 19:13:53.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.265369 systemd[1]: Starting ignition-disks.service...
Oct  2 19:13:53.286418 kernel: audit: type=1130 audit(1696274033.263:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.285163 ignition[837]: Ignition 2.14.0
Oct  2 19:13:53.285168 ignition[837]: Stage: disks
Oct  2 19:13:53.285259 ignition[837]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:13:53.285276 ignition[837]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 19:13:53.293110 systemd[1]: Finished ignition-disks.service.
Oct  2 19:13:53.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.289902 ignition[837]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 19:13:53.314690 kernel: audit: type=1130 audit(1696274033.294:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.295581 systemd[1]: Reached target initrd-root-device.target.
Oct  2 19:13:53.291383 ignition[837]: disks: disks passed
Oct  2 19:13:53.309973 systemd[1]: Reached target local-fs-pre.target.
Oct  2 19:13:53.291419 ignition[837]: Ignition finished successfully
Oct  2 19:13:53.314768 systemd[1]: Reached target local-fs.target.
Oct  2 19:13:53.319025 systemd[1]: Reached target sysinit.target.
Oct  2 19:13:53.323564 systemd[1]: Reached target basic.target.
Oct  2 19:13:53.328067 systemd[1]: Starting systemd-fsck-root.service...
Oct  2 19:13:53.392665 systemd-fsck[845]: ROOT: clean, 603/7326000 files, 481068/7359488 blocks
Oct  2 19:13:53.404284 systemd[1]: Finished systemd-fsck-root.service.
Oct  2 19:13:53.423434 kernel: audit: type=1130 audit(1696274033.405:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:53.407346 systemd[1]: Mounting sysroot.mount...
Oct  2 19:13:53.442628 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Oct  2 19:13:53.442948 systemd[1]: Mounted sysroot.mount.
Oct  2 19:13:53.446791 systemd[1]: Reached target initrd-root-fs.target.
Oct  2 19:13:53.484088 systemd[1]: Mounting sysroot-usr.mount...
Oct  2 19:13:53.489651 systemd[1]: Starting flatcar-metadata-hostname.service...
Oct  2 19:13:53.494406 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Oct  2 19:13:53.494442 systemd[1]: Reached target ignition-diskful.target.
Oct  2 19:13:53.501979 systemd[1]: Mounted sysroot-usr.mount.
Oct  2 19:13:53.543528 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Oct  2 19:13:53.550073 systemd[1]: Starting initrd-setup-root.service...
Oct  2 19:13:53.565628 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (856)
Oct  2 19:13:53.565666 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 19:13:53.574309 kernel: BTRFS info (device sda6): using free space tree
Oct  2 19:13:53.574339 kernel: BTRFS info (device sda6): has skinny extents
Oct  2 19:13:53.583138 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Oct  2 19:13:53.588411 initrd-setup-root[861]: cut: /sysroot/etc/passwd: No such file or directory
Oct  2 19:13:53.609197 initrd-setup-root[887]: cut: /sysroot/etc/group: No such file or directory
Oct  2 19:13:53.640945 initrd-setup-root[895]: cut: /sysroot/etc/shadow: No such file or directory
Oct  2 19:13:53.650031 initrd-setup-root[903]: cut: /sysroot/etc/gshadow: No such file or directory
Oct  2 19:13:54.073261 systemd[1]: Finished initrd-setup-root.service.
Oct  2 19:13:54.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:54.079011 systemd[1]: Starting ignition-mount.service...
Oct  2 19:13:54.095573 kernel: audit: type=1130 audit(1696274034.077:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:54.093515 systemd[1]: Starting sysroot-boot.service...
Oct  2 19:13:54.100499 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Oct  2 19:13:54.100660 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Oct  2 19:13:54.120513 systemd[1]: Finished sysroot-boot.service.
Oct  2 19:13:54.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:54.134128 ignition[922]: INFO     : Ignition 2.14.0
Oct  2 19:13:54.134128 ignition[922]: INFO     : Stage: mount
Oct  2 19:13:54.134128 ignition[922]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:13:54.134128 ignition[922]: DEBUG    : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 19:13:54.165127 kernel: audit: type=1130 audit(1696274034.124:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:54.165151 kernel: audit: type=1130 audit(1696274034.149:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:54.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:54.144441 systemd[1]: Finished ignition-mount.service.
Oct  2 19:13:54.167369 ignition[922]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 19:13:54.167369 ignition[922]: INFO     : mount: mount passed
Oct  2 19:13:54.167369 ignition[922]: INFO     : Ignition finished successfully
Oct  2 19:13:54.886336 coreos-metadata[855]: Oct 02 19:13:54.886 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1
Oct  2 19:13:54.902739 coreos-metadata[855]: Oct 02 19:13:54.902 INFO Fetch successful
Oct  2 19:13:54.939661 coreos-metadata[855]: Oct 02 19:13:54.939 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1
Oct  2 19:13:54.957593 coreos-metadata[855]: Oct 02 19:13:54.957 INFO Fetch successful
Oct  2 19:13:54.972760 coreos-metadata[855]: Oct 02 19:13:54.972 INFO wrote hostname ci-3510.3.0-a-e4b0ec5c33 to /sysroot/etc/hostname
Oct  2 19:13:54.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:54.974793 systemd[1]: Finished flatcar-metadata-hostname.service.
Oct  2 19:13:54.996924 kernel: audit: type=1130 audit(1696274034.979:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:13:54.980947 systemd[1]: Starting ignition-files.service...
Oct  2 19:13:55.000132 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Oct  2 19:13:55.013633 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (935)
Oct  2 19:13:55.013664 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 19:13:55.022182 kernel: BTRFS info (device sda6): using free space tree
Oct  2 19:13:55.022203 kernel: BTRFS info (device sda6): has skinny extents
Oct  2 19:13:55.031912 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Oct  2 19:13:55.045453 ignition[954]: INFO     : Ignition 2.14.0
Oct  2 19:13:55.045453 ignition[954]: INFO     : Stage: files
Oct  2 19:13:55.049276 ignition[954]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:13:55.049276 ignition[954]: DEBUG    : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 19:13:55.061511 ignition[954]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 19:13:55.082483 ignition[954]: DEBUG    : files: compiled without relabeling support, skipping
Oct  2 19:13:55.085789 ignition[954]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Oct  2 19:13:55.085789 ignition[954]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Oct  2 19:13:55.150663 ignition[954]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Oct  2 19:13:55.157574 ignition[954]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Oct  2 19:13:55.171379 unknown[954]: wrote ssh authorized keys file for user: core
Oct  2 19:13:55.174340 ignition[954]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Oct  2 19:13:55.178342 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Oct  2 19:13:55.183392 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1
Oct  2 19:13:55.853816 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET result: OK
Oct  2 19:13:56.030595 ignition[954]: DEBUG    : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d
Oct  2 19:13:56.038806 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Oct  2 19:13:56.038806 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz"
Oct  2 19:13:56.038806 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1
Oct  2 19:13:56.150899 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET result: OK
Oct  2 19:13:56.235426 ignition[954]: DEBUG    : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449
Oct  2 19:13:56.244986 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz"
Oct  2 19:13:56.244986 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/opt/bin/kubeadm"
Oct  2 19:13:56.244986 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1
Oct  2 19:13:56.420528 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET result: OK
Oct  2 19:13:58.327663 ignition[954]: DEBUG    : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660
Oct  2 19:13:58.335629 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm"
Oct  2 19:13:58.335629 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/bin/kubelet"
Oct  2 19:13:58.335629 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1
Oct  2 19:13:58.457576 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET result: OK
Oct  2 19:14:02.471652 ignition[954]: DEBUG    : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b
Oct  2 19:14:02.481521 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet"
Oct  2 19:14:02.481521 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/opt/bin/kubectl"
Oct  2 19:14:02.481521 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1
Oct  2 19:14:02.603828 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET result: OK
Oct  2 19:14:04.585522 ignition[954]: DEBUG    : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628
Oct  2 19:14:04.594516 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl"
Oct  2 19:14:04.594516 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/etc/docker/daemon.json"
Oct  2 19:14:04.594516 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json"
Oct  2 19:14:04.594516 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/home/core/install.sh"
Oct  2 19:14:04.611860 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh"
Oct  2 19:14:04.611860 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing file "/sysroot/home/core/nginx.yaml"
Oct  2 19:14:04.611860 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml"
Oct  2 19:14:04.625535 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [started]  writing file "/sysroot/etc/systemd/system/waagent.service"
Oct  2 19:14:04.625535 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition
Oct  2 19:14:04.644112 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(c): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2551007971"
Oct  2 19:14:04.649100 ignition[954]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2551007971": device or resource busy
Oct  2 19:14:04.649100 ignition[954]: ERROR    : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2551007971", trying btrfs: device or resource busy
Oct  2 19:14:04.649100 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(d): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2551007971"
Oct  2 19:14:04.672599 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (958)
Oct  2 19:14:04.674455 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2551007971"
Oct  2 19:14:04.682107 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(e): [started]  unmounting "/mnt/oem2551007971"
Oct  2 19:14:04.687548 systemd[1]: mnt-oem2551007971.mount: Deactivated successfully.
Oct  2 19:14:04.690391 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem2551007971"
Oct  2 19:14:04.694443 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/waagent.service"
Oct  2 19:14:04.699071 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [started]  writing file "/sysroot/etc/systemd/system/nvidia.service"
Oct  2 19:14:04.703883 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition
Oct  2 19:14:04.713018 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(10): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2474896686"
Oct  2 19:14:04.717970 ignition[954]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2474896686": device or resource busy
Oct  2 19:14:04.717970 ignition[954]: ERROR    : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2474896686", trying btrfs: device or resource busy
Oct  2 19:14:04.717970 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(11): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2474896686"
Oct  2 19:14:04.734481 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2474896686"
Oct  2 19:14:04.739666 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(12): [started]  unmounting "/mnt/oem2474896686"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2474896686"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(13): [started]  processing unit "waagent.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(13): [finished] processing unit "waagent.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(14): [started]  processing unit "nvidia.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(14): [finished] processing unit "nvidia.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(15): [started]  processing unit "prepare-cni-plugins.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(15): op(16): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(15): [finished] processing unit "prepare-cni-plugins.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(17): [started]  processing unit "prepare-critools.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(17): op(18): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(17): [finished] processing unit "prepare-critools.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(19): [started]  setting preset to enabled for "waagent.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(19): [finished] setting preset to enabled for "waagent.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(1a): [started]  setting preset to enabled for "nvidia.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(1a): [finished] setting preset to enabled for "nvidia.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(1b): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 19:14:04.745867 ignition[954]: INFO     : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 19:14:04.837523 kernel: audit: type=1130 audit(1696274044.802:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.741220 systemd[1]: mnt-oem2474896686.mount: Deactivated successfully.
Oct  2 19:14:04.840129 ignition[954]: INFO     : files: op(1c): [started]  setting preset to enabled for "prepare-critools.service"
Oct  2 19:14:04.840129 ignition[954]: INFO     : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service"
Oct  2 19:14:04.840129 ignition[954]: INFO     : files: createResultFile: createFiles: op(1d): [started]  writing file "/sysroot/etc/.ignition-result.json"
Oct  2 19:14:04.840129 ignition[954]: INFO     : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json"
Oct  2 19:14:04.840129 ignition[954]: INFO     : files: files passed
Oct  2 19:14:04.840129 ignition[954]: INFO     : Ignition finished successfully
Oct  2 19:14:04.905143 kernel: audit: type=1130 audit(1696274044.865:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.905178 kernel: audit: type=1131 audit(1696274044.876:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.905203 kernel: audit: type=1130 audit(1696274044.889:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.795053 systemd[1]: Finished ignition-files.service.
Oct  2 19:14:04.816506 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Oct  2 19:14:04.912545 initrd-setup-root-after-ignition[979]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Oct  2 19:14:04.846409 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Oct  2 19:14:04.847208 systemd[1]: Starting ignition-quench.service...
Oct  2 19:14:04.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.856961 systemd[1]: ignition-quench.service: Deactivated successfully.
Oct  2 19:14:04.955359 kernel: audit: type=1130 audit(1696274044.924:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.955391 kernel: audit: type=1131 audit(1696274044.926:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.857052 systemd[1]: Finished ignition-quench.service.
Oct  2 19:14:04.877576 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Oct  2 19:14:04.890218 systemd[1]: Reached target ignition-complete.target.
Oct  2 19:14:04.905955 systemd[1]: Starting initrd-parse-etc.service...
Oct  2 19:14:04.922679 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Oct  2 19:14:04.922763 systemd[1]: Finished initrd-parse-etc.service.
Oct  2 19:14:04.926896 systemd[1]: Reached target initrd-fs.target.
Oct  2 19:14:04.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.950844 systemd[1]: Reached target initrd.target.
Oct  2 19:14:04.992377 kernel: audit: type=1130 audit(1696274044.975:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:04.955402 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Oct  2 19:14:04.960503 systemd[1]: Starting dracut-pre-pivot.service...
Oct  2 19:14:04.973348 systemd[1]: Finished dracut-pre-pivot.service.
Oct  2 19:14:04.976835 systemd[1]: Starting initrd-cleanup.service...
Oct  2 19:14:05.008184 systemd[1]: Stopped target nss-lookup.target.
Oct  2 19:14:05.012785 systemd[1]: Stopped target remote-cryptsetup.target.
Oct  2 19:14:05.017356 systemd[1]: Stopped target timers.target.
Oct  2 19:14:05.021399 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Oct  2 19:14:05.023877 systemd[1]: Stopped dracut-pre-pivot.service.
Oct  2 19:14:05.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.038648 systemd[1]: Stopped target initrd.target.
Oct  2 19:14:05.043105 kernel: audit: type=1131 audit(1696274045.025:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.043294 systemd[1]: Stopped target basic.target.
Oct  2 19:14:05.047209 systemd[1]: Stopped target ignition-complete.target.
Oct  2 19:14:05.051953 systemd[1]: Stopped target ignition-diskful.target.
Oct  2 19:14:05.056484 systemd[1]: Stopped target initrd-root-device.target.
Oct  2 19:14:05.061094 systemd[1]: Stopped target remote-fs.target.
Oct  2 19:14:05.065230 systemd[1]: Stopped target remote-fs-pre.target.
Oct  2 19:14:05.069777 systemd[1]: Stopped target sysinit.target.
Oct  2 19:14:05.073982 systemd[1]: Stopped target local-fs.target.
Oct  2 19:14:05.078096 systemd[1]: Stopped target local-fs-pre.target.
Oct  2 19:14:05.084421 systemd[1]: Stopped target swap.target.
Oct  2 19:14:05.088175 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Oct  2 19:14:05.090682 systemd[1]: Stopped dracut-pre-mount.service.
Oct  2 19:14:05.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.095011 systemd[1]: Stopped target cryptsetup.target.
Oct  2 19:14:05.112159 kernel: audit: type=1131 audit(1696274045.094:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.112226 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Oct  2 19:14:05.114691 systemd[1]: Stopped dracut-initqueue.service.
Oct  2 19:14:05.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.119057 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Oct  2 19:14:05.136065 kernel: audit: type=1131 audit(1696274045.118:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.119165 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Oct  2 19:14:05.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.138490 systemd[1]: ignition-files.service: Deactivated successfully.
Oct  2 19:14:05.140896 systemd[1]: Stopped ignition-files.service.
Oct  2 19:14:05.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.145101 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully.
Oct  2 19:14:05.147860 systemd[1]: Stopped flatcar-metadata-hostname.service.
Oct  2 19:14:05.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.160676 iscsid[803]: iscsid shutting down.
Oct  2 19:14:05.153502 systemd[1]: Stopping ignition-mount.service...
Oct  2 19:14:05.164369 ignition[992]: INFO     : Ignition 2.14.0
Oct  2 19:14:05.164369 ignition[992]: INFO     : Stage: umount
Oct  2 19:14:05.164369 ignition[992]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:14:05.164369 ignition[992]: DEBUG    : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 19:14:05.158543 systemd[1]: Stopping iscsid.service...
Oct  2 19:14:05.179182 ignition[992]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 19:14:05.179182 ignition[992]: INFO     : umount: umount passed
Oct  2 19:14:05.179182 ignition[992]: INFO     : Ignition finished successfully
Oct  2 19:14:05.179758 systemd[1]: Stopping sysroot-boot.service...
Oct  2 19:14:05.190066 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Oct  2 19:14:05.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.190263 systemd[1]: Stopped systemd-udev-trigger.service.
Oct  2 19:14:05.194512 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Oct  2 19:14:05.194682 systemd[1]: Stopped dracut-pre-trigger.service.
Oct  2 19:14:05.198141 systemd[1]: iscsid.service: Deactivated successfully.
Oct  2 19:14:05.198666 systemd[1]: Stopped iscsid.service.
Oct  2 19:14:05.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.212048 systemd[1]: ignition-mount.service: Deactivated successfully.
Oct  2 19:14:05.212234 systemd[1]: Stopped ignition-mount.service.
Oct  2 19:14:05.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.218926 systemd[1]: ignition-disks.service: Deactivated successfully.
Oct  2 19:14:05.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.219062 systemd[1]: Stopped ignition-disks.service.
Oct  2 19:14:05.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.221356 systemd[1]: ignition-kargs.service: Deactivated successfully.
Oct  2 19:14:05.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.221406 systemd[1]: Stopped ignition-kargs.service.
Oct  2 19:14:05.226046 systemd[1]: ignition-fetch.service: Deactivated successfully.
Oct  2 19:14:05.226095 systemd[1]: Stopped ignition-fetch.service.
Oct  2 19:14:05.228379 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Oct  2 19:14:05.228425 systemd[1]: Stopped ignition-fetch-offline.service.
Oct  2 19:14:05.235666 systemd[1]: Stopped target paths.target.
Oct  2 19:14:05.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.238621 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Oct  2 19:14:05.243644 systemd[1]: Stopped systemd-ask-password-console.path.
Oct  2 19:14:05.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.248234 systemd[1]: Stopped target slices.target.
Oct  2 19:14:05.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.250093 systemd[1]: Stopped target sockets.target.
Oct  2 19:14:05.252056 systemd[1]: iscsid.socket: Deactivated successfully.
Oct  2 19:14:05.252100 systemd[1]: Closed iscsid.socket.
Oct  2 19:14:05.256092 systemd[1]: ignition-setup.service: Deactivated successfully.
Oct  2 19:14:05.256138 systemd[1]: Stopped ignition-setup.service.
Oct  2 19:14:05.262350 systemd[1]: Stopping iscsiuio.service...
Oct  2 19:14:05.264904 systemd[1]: iscsiuio.service: Deactivated successfully.
Oct  2 19:14:05.264995 systemd[1]: Stopped iscsiuio.service.
Oct  2 19:14:05.270098 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Oct  2 19:14:05.270531 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Oct  2 19:14:05.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.270624 systemd[1]: Finished initrd-cleanup.service.
Oct  2 19:14:05.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.273986 systemd[1]: Stopped target network.target.
Oct  2 19:14:05.277189 systemd[1]: iscsiuio.socket: Deactivated successfully.
Oct  2 19:14:05.277227 systemd[1]: Closed iscsiuio.socket.
Oct  2 19:14:05.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.279132 systemd[1]: Stopping systemd-networkd.service...
Oct  2 19:14:05.317000 audit: BPF prog-id=6 op=UNLOAD
Oct  2 19:14:05.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.281396 systemd[1]: Stopping systemd-resolved.service...
Oct  2 19:14:05.289030 systemd-networkd[797]: eth0: DHCPv6 lease lost
Oct  2 19:14:05.328000 audit: BPF prog-id=9 op=UNLOAD
Oct  2 19:14:05.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.293635 systemd[1]: sysroot-boot.service: Deactivated successfully.
Oct  2 19:14:05.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.293733 systemd[1]: Stopped sysroot-boot.service.
Oct  2 19:14:05.305963 systemd[1]: systemd-resolved.service: Deactivated successfully.
Oct  2 19:14:05.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.306061 systemd[1]: Stopped systemd-resolved.service.
Oct  2 19:14:05.312359 systemd[1]: systemd-networkd.service: Deactivated successfully.
Oct  2 19:14:05.312453 systemd[1]: Stopped systemd-networkd.service.
Oct  2 19:14:05.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.318541 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Oct  2 19:14:05.318576 systemd[1]: Closed systemd-networkd.socket.
Oct  2 19:14:05.322563 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Oct  2 19:14:05.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.322618 systemd[1]: Stopped initrd-setup-root.service.
Oct  2 19:14:05.326824 systemd[1]: Stopping network-cleanup.service...
Oct  2 19:14:05.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.328855 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Oct  2 19:14:05.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.328926 systemd[1]: Stopped parse-ip-for-networkd.service.
Oct  2 19:14:05.333211 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Oct  2 19:14:05.333269 systemd[1]: Stopped systemd-sysctl.service.
Oct  2 19:14:05.335651 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Oct  2 19:14:05.335694 systemd[1]: Stopped systemd-modules-load.service.
Oct  2 19:14:05.340519 systemd[1]: Stopping systemd-udevd.service...
Oct  2 19:14:05.344605 systemd[1]: systemd-udevd.service: Deactivated successfully.
Oct  2 19:14:05.344743 systemd[1]: Stopped systemd-udevd.service.
Oct  2 19:14:05.349698 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Oct  2 19:14:05.349754 systemd[1]: Closed systemd-udevd-control.socket.
Oct  2 19:14:05.355711 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Oct  2 19:14:05.355804 systemd[1]: Closed systemd-udevd-kernel.socket.
Oct  2 19:14:05.357989 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Oct  2 19:14:05.358029 systemd[1]: Stopped dracut-pre-udev.service.
Oct  2 19:14:05.434374 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: Data path switched from VF: enP26643s1
Oct  2 19:14:05.362021 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Oct  2 19:14:05.362071 systemd[1]: Stopped dracut-cmdline.service.
Oct  2 19:14:05.364098 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Oct  2 19:14:05.364142 systemd[1]: Stopped dracut-cmdline-ask.service.
Oct  2 19:14:05.367104 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Oct  2 19:14:05.375977 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
Oct  2 19:14:05.376027 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service.
Oct  2 19:14:05.378473 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Oct  2 19:14:05.378522 systemd[1]: Stopped kmod-static-nodes.service.
Oct  2 19:14:05.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:05.385364 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Oct  2 19:14:05.385413 systemd[1]: Stopped systemd-vconsole-setup.service.
Oct  2 19:14:05.387945 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Oct  2 19:14:05.388034 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Oct  2 19:14:05.456222 systemd[1]: network-cleanup.service: Deactivated successfully.
Oct  2 19:14:05.456326 systemd[1]: Stopped network-cleanup.service.
Oct  2 19:14:05.460307 systemd[1]: Reached target initrd-switch-root.target.
Oct  2 19:14:05.465688 systemd[1]: Starting initrd-switch-root.service...
Oct  2 19:14:05.479059 systemd[1]: Switching root.
Oct  2 19:14:05.504678 systemd-journald[183]: Journal stopped
Oct  2 19:14:18.736132 systemd-journald[183]: Received SIGTERM from PID 1 (systemd).
Oct  2 19:14:18.736173 kernel: SELinux:  Class mctp_socket not defined in policy.
Oct  2 19:14:18.736191 kernel: SELinux:  Class anon_inode not defined in policy.
Oct  2 19:14:18.736206 kernel: SELinux: the above unknown classes and permissions will be allowed
Oct  2 19:14:18.736219 kernel: SELinux:  policy capability network_peer_controls=1
Oct  2 19:14:18.736232 kernel: SELinux:  policy capability open_perms=1
Oct  2 19:14:18.736249 kernel: SELinux:  policy capability extended_socket_class=1
Oct  2 19:14:18.736266 kernel: SELinux:  policy capability always_check_network=0
Oct  2 19:14:18.736279 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct  2 19:14:18.736290 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct  2 19:14:18.736302 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Oct  2 19:14:18.736316 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Oct  2 19:14:18.736330 systemd[1]: Successfully loaded SELinux policy in 355.421ms.
Oct  2 19:14:18.736346 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.875ms.
Oct  2 19:14:18.736367 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 19:14:18.736384 systemd[1]: Detected virtualization microsoft.
Oct  2 19:14:18.736399 systemd[1]: Detected architecture x86-64.
Oct  2 19:14:18.736415 systemd[1]: Detected first boot.
Oct  2 19:14:18.736434 systemd[1]: Hostname set to <ci-3510.3.0-a-e4b0ec5c33>.
Oct  2 19:14:18.736450 systemd[1]: Initializing machine ID from random generator.
Oct  2 19:14:18.736464 systemd[1]: Populated /etc with preset unit settings.
Oct  2 19:14:18.736480 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:14:18.736495 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:14:18.736511 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:14:18.736528 kernel: kauditd_printk_skb: 42 callbacks suppressed
Oct  2 19:14:18.736545 kernel: audit: type=1334 audit(1696274058.173:90): prog-id=12 op=LOAD
Oct  2 19:14:18.736564 kernel: audit: type=1334 audit(1696274058.173:91): prog-id=3 op=UNLOAD
Oct  2 19:14:18.736580 kernel: audit: type=1334 audit(1696274058.184:92): prog-id=13 op=LOAD
Oct  2 19:14:18.736596 kernel: audit: type=1334 audit(1696274058.193:93): prog-id=14 op=LOAD
Oct  2 19:14:18.736635 kernel: audit: type=1334 audit(1696274058.193:94): prog-id=4 op=UNLOAD
Oct  2 19:14:18.736652 kernel: audit: type=1334 audit(1696274058.193:95): prog-id=5 op=UNLOAD
Oct  2 19:14:18.736666 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Oct  2 19:14:18.736682 kernel: audit: type=1131 audit(1696274058.194:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.736702 systemd[1]: Stopped initrd-switch-root.service.
Oct  2 19:14:18.736719 kernel: audit: type=1130 audit(1696274058.236:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.736734 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Oct  2 19:14:18.736751 kernel: audit: type=1131 audit(1696274058.236:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.736766 kernel: audit: type=1334 audit(1696274058.268:99): prog-id=12 op=UNLOAD
Oct  2 19:14:18.736782 systemd[1]: Created slice system-addon\x2dconfig.slice.
Oct  2 19:14:18.736801 systemd[1]: Created slice system-addon\x2drun.slice.
Oct  2 19:14:18.736819 systemd[1]: Created slice system-getty.slice.
Oct  2 19:14:18.736838 systemd[1]: Created slice system-modprobe.slice.
Oct  2 19:14:18.736856 systemd[1]: Created slice system-serial\x2dgetty.slice.
Oct  2 19:14:18.736874 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Oct  2 19:14:18.736892 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Oct  2 19:14:18.736909 systemd[1]: Created slice user.slice.
Oct  2 19:14:18.736926 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 19:14:18.736943 systemd[1]: Started systemd-ask-password-wall.path.
Oct  2 19:14:18.736959 systemd[1]: Set up automount boot.automount.
Oct  2 19:14:18.736979 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Oct  2 19:14:18.736996 systemd[1]: Stopped target initrd-switch-root.target.
Oct  2 19:14:18.737013 systemd[1]: Stopped target initrd-fs.target.
Oct  2 19:14:18.737029 systemd[1]: Stopped target initrd-root-fs.target.
Oct  2 19:14:18.737045 systemd[1]: Reached target integritysetup.target.
Oct  2 19:14:18.737064 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 19:14:18.737081 systemd[1]: Reached target remote-fs.target.
Oct  2 19:14:18.737100 systemd[1]: Reached target slices.target.
Oct  2 19:14:18.737117 systemd[1]: Reached target swap.target.
Oct  2 19:14:18.737134 systemd[1]: Reached target torcx.target.
Oct  2 19:14:18.737150 systemd[1]: Reached target veritysetup.target.
Oct  2 19:14:18.737167 systemd[1]: Listening on systemd-coredump.socket.
Oct  2 19:14:18.737184 systemd[1]: Listening on systemd-initctl.socket.
Oct  2 19:14:18.737201 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 19:14:18.737222 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 19:14:18.737241 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 19:14:18.737257 systemd[1]: Listening on systemd-userdbd.socket.
Oct  2 19:14:18.737274 systemd[1]: Mounting dev-hugepages.mount...
Oct  2 19:14:18.737291 systemd[1]: Mounting dev-mqueue.mount...
Oct  2 19:14:18.737308 systemd[1]: Mounting media.mount...
Oct  2 19:14:18.737326 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Oct  2 19:14:18.737346 systemd[1]: Mounting sys-kernel-debug.mount...
Oct  2 19:14:18.737364 systemd[1]: Mounting sys-kernel-tracing.mount...
Oct  2 19:14:18.737381 systemd[1]: Mounting tmp.mount...
Oct  2 19:14:18.737398 systemd[1]: Starting flatcar-tmpfiles.service...
Oct  2 19:14:18.737416 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Oct  2 19:14:18.737435 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 19:14:18.737452 systemd[1]: Starting modprobe@configfs.service...
Oct  2 19:14:18.737468 systemd[1]: Starting modprobe@dm_mod.service...
Oct  2 19:14:18.737485 systemd[1]: Starting modprobe@drm.service...
Oct  2 19:14:18.737505 systemd[1]: Starting modprobe@efi_pstore.service...
Oct  2 19:14:18.737523 systemd[1]: Starting modprobe@fuse.service...
Oct  2 19:14:18.737539 systemd[1]: Starting modprobe@loop.service...
Oct  2 19:14:18.737558 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Oct  2 19:14:18.737575 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Oct  2 19:14:18.737594 systemd[1]: Stopped systemd-fsck-root.service.
Oct  2 19:14:18.737623 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Oct  2 19:14:18.737640 systemd[1]: Stopped systemd-fsck-usr.service.
Oct  2 19:14:18.737661 systemd[1]: Stopped systemd-journald.service.
Oct  2 19:14:18.737677 systemd[1]: Starting systemd-journald.service...
Oct  2 19:14:18.737695 kernel: loop: module loaded
Oct  2 19:14:18.737711 systemd[1]: Starting systemd-modules-load.service...
Oct  2 19:14:18.737728 systemd[1]: Starting systemd-network-generator.service...
Oct  2 19:14:18.737745 systemd[1]: Starting systemd-remount-fs.service...
Oct  2 19:14:18.737763 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 19:14:18.737780 kernel: fuse: init (API version 7.34)
Oct  2 19:14:18.737796 systemd[1]: verity-setup.service: Deactivated successfully.
Oct  2 19:14:18.737816 systemd[1]: Stopped verity-setup.service.
Oct  2 19:14:18.737836 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Oct  2 19:14:18.737853 systemd[1]: Mounted dev-hugepages.mount.
Oct  2 19:14:18.737869 systemd[1]: Mounted dev-mqueue.mount.
Oct  2 19:14:18.737885 systemd[1]: Mounted media.mount.
Oct  2 19:14:18.737903 systemd[1]: Mounted sys-kernel-debug.mount.
Oct  2 19:14:18.737920 systemd[1]: Mounted sys-kernel-tracing.mount.
Oct  2 19:14:18.737944 systemd-journald[1123]: Journal started
Oct  2 19:14:18.738013 systemd-journald[1123]: Runtime Journal (/run/log/journal/fbdf4143f308436287d96f9ed77da498) is 8.0M, max 159.0M, 151.0M free.
Oct  2 19:14:07.820000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct  2 19:14:08.641000 audit[1]: AVC avc:  denied  { integrity } for  pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Oct  2 19:14:08.657000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 19:14:08.657000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 19:14:08.657000 audit: BPF prog-id=10 op=LOAD
Oct  2 19:14:08.657000 audit: BPF prog-id=10 op=UNLOAD
Oct  2 19:14:08.657000 audit: BPF prog-id=11 op=LOAD
Oct  2 19:14:08.657000 audit: BPF prog-id=11 op=UNLOAD
Oct  2 19:14:18.173000 audit: BPF prog-id=12 op=LOAD
Oct  2 19:14:18.173000 audit: BPF prog-id=3 op=UNLOAD
Oct  2 19:14:18.184000 audit: BPF prog-id=13 op=LOAD
Oct  2 19:14:18.193000 audit: BPF prog-id=14 op=LOAD
Oct  2 19:14:18.193000 audit: BPF prog-id=4 op=UNLOAD
Oct  2 19:14:18.193000 audit: BPF prog-id=5 op=UNLOAD
Oct  2 19:14:18.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.268000 audit: BPF prog-id=12 op=UNLOAD
Oct  2 19:14:18.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.607000 audit: BPF prog-id=15 op=LOAD
Oct  2 19:14:18.607000 audit: BPF prog-id=16 op=LOAD
Oct  2 19:14:18.607000 audit: BPF prog-id=17 op=LOAD
Oct  2 19:14:18.607000 audit: BPF prog-id=13 op=UNLOAD
Oct  2 19:14:18.607000 audit: BPF prog-id=14 op=UNLOAD
Oct  2 19:14:18.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.733000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Oct  2 19:14:18.733000 audit[1123]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffee0c03430 a2=4000 a3=7ffee0c034cc items=0 ppid=1 pid=1123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:14:18.733000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Oct  2 19:14:18.172308 systemd[1]: Queued start job for default target multi-user.target.
Oct  2 19:14:09.910848 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:14:18.195300 systemd[1]: systemd-journald.service: Deactivated successfully.
Oct  2 19:14:09.911307 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 19:14:09.911329 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 19:14:09.911368 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Oct  2 19:14:09.911379 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="skipped missing lower profile" missing profile=oem
Oct  2 19:14:09.911429 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Oct  2 19:14:09.911444 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Oct  2 19:14:09.911686 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Oct  2 19:14:09.911742 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 19:14:09.911760 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 19:14:09.912197 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Oct  2 19:14:09.912236 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Oct  2 19:14:09.912257 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0
Oct  2 19:14:18.744950 systemd[1]: Started systemd-journald.service.
Oct  2 19:14:18.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:09.912274 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Oct  2 19:14:09.912293 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0
Oct  2 19:14:09.912309 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Oct  2 19:14:17.003038 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:14:18.745378 systemd[1]: Mounted tmp.mount.
Oct  2 19:14:17.003286 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:14:17.003411 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:14:17.003578 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:14:17.003650 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Oct  2 19:14:18.747686 systemd[1]: Finished flatcar-tmpfiles.service.
Oct  2 19:14:18.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:17.003709 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Oct  2 19:14:18.750118 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 19:14:18.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.752490 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Oct  2 19:14:18.752684 systemd[1]: Finished modprobe@configfs.service.
Oct  2 19:14:18.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.755340 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Oct  2 19:14:18.755471 systemd[1]: Finished modprobe@dm_mod.service.
Oct  2 19:14:18.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.758164 systemd[1]: modprobe@drm.service: Deactivated successfully.
Oct  2 19:14:18.758292 systemd[1]: Finished modprobe@drm.service.
Oct  2 19:14:18.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.760978 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Oct  2 19:14:18.761103 systemd[1]: Finished modprobe@efi_pstore.service.
Oct  2 19:14:18.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.764042 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Oct  2 19:14:18.764142 systemd[1]: Finished modprobe@fuse.service.
Oct  2 19:14:18.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.766553 systemd[1]: modprobe@loop.service: Deactivated successfully.
Oct  2 19:14:18.766693 systemd[1]: Finished modprobe@loop.service.
Oct  2 19:14:18.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.769183 systemd[1]: Finished systemd-network-generator.service.
Oct  2 19:14:18.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.771921 systemd[1]: Finished systemd-remount-fs.service.
Oct  2 19:14:18.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.774546 systemd[1]: Reached target network-pre.target.
Oct  2 19:14:18.778130 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Oct  2 19:14:18.785841 systemd[1]: Mounting sys-kernel-config.mount...
Oct  2 19:14:18.788092 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Oct  2 19:14:18.802602 systemd[1]: Starting systemd-hwdb-update.service...
Oct  2 19:14:18.805931 systemd[1]: Starting systemd-journal-flush.service...
Oct  2 19:14:18.808293 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Oct  2 19:14:18.809517 systemd[1]: Starting systemd-random-seed.service...
Oct  2 19:14:18.811720 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Oct  2 19:14:18.813690 systemd[1]: Starting systemd-sysusers.service...
Oct  2 19:14:18.819359 systemd[1]: Finished systemd-modules-load.service.
Oct  2 19:14:18.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.821946 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Oct  2 19:14:18.824799 systemd[1]: Mounted sys-kernel-config.mount.
Oct  2 19:14:18.828224 systemd[1]: Starting systemd-sysctl.service...
Oct  2 19:14:18.851035 systemd[1]: Finished systemd-random-seed.service.
Oct  2 19:14:18.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.853969 systemd[1]: Reached target first-boot-complete.target.
Oct  2 19:14:18.871375 systemd-journald[1123]: Time spent on flushing to /var/log/journal/fbdf4143f308436287d96f9ed77da498 is 25.452ms for 1158 entries.
Oct  2 19:14:18.871375 systemd-journald[1123]: System Journal (/var/log/journal/fbdf4143f308436287d96f9ed77da498) is 8.0M, max 2.6G, 2.6G free.
Oct  2 19:14:18.948646 systemd-journald[1123]: Received client request to flush runtime journal.
Oct  2 19:14:18.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:18.880603 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 19:14:18.884170 systemd[1]: Starting systemd-udev-settle.service...
Oct  2 19:14:18.953206 udevadm[1149]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in.
Oct  2 19:14:18.920125 systemd[1]: Finished systemd-sysctl.service.
Oct  2 19:14:18.949701 systemd[1]: Finished systemd-journal-flush.service.
Oct  2 19:14:19.321737 systemd[1]: Finished systemd-sysusers.service.
Oct  2 19:14:19.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:19.325547 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Oct  2 19:14:19.673644 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Oct  2 19:14:19.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:20.106088 systemd[1]: Finished systemd-hwdb-update.service.
Oct  2 19:14:20.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:20.108000 audit: BPF prog-id=18 op=LOAD
Oct  2 19:14:20.108000 audit: BPF prog-id=19 op=LOAD
Oct  2 19:14:20.108000 audit: BPF prog-id=7 op=UNLOAD
Oct  2 19:14:20.108000 audit: BPF prog-id=8 op=UNLOAD
Oct  2 19:14:20.110163 systemd[1]: Starting systemd-udevd.service...
Oct  2 19:14:20.128544 systemd-udevd[1154]: Using default interface naming scheme 'v252'.
Oct  2 19:14:20.378276 systemd[1]: Started systemd-udevd.service.
Oct  2 19:14:20.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:20.381000 audit: BPF prog-id=20 op=LOAD
Oct  2 19:14:20.383513 systemd[1]: Starting systemd-networkd.service...
Oct  2 19:14:20.425363 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped.
Oct  2 19:14:20.492957 kernel: hv_utils: Registering HyperV Utility Driver
Oct  2 19:14:20.493045 kernel: hv_vmbus: registering driver hv_utils
Oct  2 19:14:21.805498 kernel: mousedev: PS/2 mouse device common for all mice
Oct  2 19:14:21.805589 kernel: hv_utils: Heartbeat IC version 3.0
Oct  2 19:14:21.805617 kernel: hv_utils: TimeSync IC version 4.0
Oct  2 19:14:21.805641 kernel: hv_utils: Shutdown IC version 3.2
Oct  2 19:14:20.498000 audit: BPF prog-id=21 op=LOAD
Oct  2 19:14:20.498000 audit: BPF prog-id=22 op=LOAD
Oct  2 19:14:20.498000 audit: BPF prog-id=23 op=LOAD
Oct  2 19:14:20.500327 systemd[1]: Starting systemd-userdbd.service...
Oct  2 19:14:20.509000 audit[1159]: AVC avc:  denied  { confidentiality } for  pid=1159 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Oct  2 19:14:21.841967 kernel: hv_vmbus: registering driver hyperv_fb
Oct  2 19:14:21.865209 systemd[1]: Started systemd-userdbd.service.
Oct  2 19:14:21.871848 kernel: hv_vmbus: registering driver hv_balloon
Oct  2 19:14:21.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:21.892590 kernel: hyperv_fb: Synthvid Version major 3, minor 5
Oct  2 19:14:21.892674 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608
Oct  2 19:14:21.893363 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0
Oct  2 19:14:21.902898 kernel: Console: switching to colour dummy device 80x25
Oct  2 19:14:21.911310 kernel: Console: switching to colour frame buffer device 128x48
Oct  2 19:14:20.509000 audit[1159]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556364370710 a1=f884 a2=7ff517ba7bc5 a3=5 items=10 ppid=1154 pid=1159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:14:20.509000 audit: CWD cwd="/"
Oct  2 19:14:20.509000 audit: PATH item=0 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PATH item=1 name=(null) inode=14701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PATH item=2 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PATH item=3 name=(null) inode=14702 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PATH item=4 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PATH item=5 name=(null) inode=14703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PATH item=6 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PATH item=7 name=(null) inode=14704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PATH item=8 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PATH item=9 name=(null) inode=14705 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:14:20.509000 audit: PROCTITLE proctitle="(udev-worker)"
Oct  2 19:14:22.117970 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1162)
Oct  2 19:14:22.161973 kernel: KVM: vmx: using Hyper-V Enlightened VMCS
Oct  2 19:14:22.174887 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 19:14:22.218321 systemd[1]: Finished systemd-udev-settle.service.
Oct  2 19:14:22.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:22.222367 systemd[1]: Starting lvm2-activation-early.service...
Oct  2 19:14:22.234843 systemd-networkd[1165]: lo: Link UP
Oct  2 19:14:22.234854 systemd-networkd[1165]: lo: Gained carrier
Oct  2 19:14:22.235438 systemd-networkd[1165]: Enumeration completed
Oct  2 19:14:22.235612 systemd[1]: Started systemd-networkd.service.
Oct  2 19:14:22.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:22.241181 systemd[1]: Starting systemd-networkd-wait-online.service...
Oct  2 19:14:22.262424 systemd-networkd[1165]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 19:14:22.315964 kernel: mlx5_core 6813:00:02.0 enP26643s1: Link up
Oct  2 19:14:22.357972 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: Data path switched to VF: enP26643s1
Oct  2 19:14:22.358858 systemd-networkd[1165]: enP26643s1: Link UP
Oct  2 19:14:22.359144 systemd-networkd[1165]: eth0: Link UP
Oct  2 19:14:22.359222 systemd-networkd[1165]: eth0: Gained carrier
Oct  2 19:14:22.364270 systemd-networkd[1165]: enP26643s1: Gained carrier
Oct  2 19:14:22.398075 systemd-networkd[1165]: eth0: DHCPv4 address 10.200.8.37/24, gateway 10.200.8.1 acquired from 168.63.129.16
Oct  2 19:14:23.265024 lvm[1231]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 19:14:23.295079 systemd[1]: Finished lvm2-activation-early.service.
Oct  2 19:14:23.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:23.298126 systemd[1]: Reached target cryptsetup.target.
Oct  2 19:14:23.301911 systemd[1]: Starting lvm2-activation.service...
Oct  2 19:14:23.308211 lvm[1233]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 19:14:23.328962 systemd[1]: Finished lvm2-activation.service.
Oct  2 19:14:23.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:23.331784 systemd[1]: Reached target local-fs-pre.target.
Oct  2 19:14:23.334220 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Oct  2 19:14:23.334251 systemd[1]: Reached target local-fs.target.
Oct  2 19:14:23.336362 systemd[1]: Reached target machines.target.
Oct  2 19:14:23.339578 systemd[1]: Starting ldconfig.service...
Oct  2 19:14:23.354334 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Oct  2 19:14:23.354458 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 19:14:23.356058 systemd[1]: Starting systemd-boot-update.service...
Oct  2 19:14:23.359979 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Oct  2 19:14:23.364633 systemd[1]: Starting systemd-machine-id-commit.service...
Oct  2 19:14:23.367363 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Oct  2 19:14:23.367465 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Oct  2 19:14:23.368594 systemd[1]: Starting systemd-tmpfiles-setup.service...
Oct  2 19:14:23.395200 systemd-tmpfiles[1238]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Oct  2 19:14:23.408543 systemd-tmpfiles[1238]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Oct  2 19:14:23.409473 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Oct  2 19:14:23.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:23.419915 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1235 (bootctl)
Oct  2 19:14:23.421154 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Oct  2 19:14:23.437964 systemd-tmpfiles[1238]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Oct  2 19:14:24.017129 systemd-networkd[1165]: eth0: Gained IPv6LL
Oct  2 19:14:24.018868 systemd[1]: Finished systemd-networkd-wait-online.service.
Oct  2 19:14:24.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:24.157610 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Oct  2 19:14:24.158168 systemd[1]: Finished systemd-machine-id-commit.service.
Oct  2 19:14:24.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:24.769091 systemd-fsck[1243]: fsck.fat 4.2 (2021-01-31)
Oct  2 19:14:24.769091 systemd-fsck[1243]: /dev/sda1: 789 files, 115069/258078 clusters
Oct  2 19:14:24.771749 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Oct  2 19:14:24.780093 kernel: kauditd_printk_skb: 69 callbacks suppressed
Oct  2 19:14:24.780175 kernel: audit: type=1130 audit(1696274064.774:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:24.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:24.776535 systemd[1]: Mounting boot.mount...
Oct  2 19:14:24.796166 systemd[1]: Mounted boot.mount.
Oct  2 19:14:24.810358 systemd[1]: Finished systemd-boot-update.service.
Oct  2 19:14:24.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:24.825058 kernel: audit: type=1130 audit(1696274064.812:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.040074 systemd[1]: Finished systemd-tmpfiles-setup.service.
Oct  2 19:14:26.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.044513 systemd[1]: Starting audit-rules.service...
Oct  2 19:14:26.057168 kernel: audit: type=1130 audit(1696274066.042:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.058299 systemd[1]: Starting clean-ca-certificates.service...
Oct  2 19:14:26.065000 audit: BPF prog-id=24 op=LOAD
Oct  2 19:14:26.062156 systemd[1]: Starting systemd-journal-catalog-update.service...
Oct  2 19:14:26.067088 systemd[1]: Starting systemd-resolved.service...
Oct  2 19:14:26.072995 kernel: audit: type=1334 audit(1696274066.065:157): prog-id=24 op=LOAD
Oct  2 19:14:26.073000 audit: BPF prog-id=25 op=LOAD
Oct  2 19:14:26.075130 systemd[1]: Starting systemd-timesyncd.service...
Oct  2 19:14:26.079961 kernel: audit: type=1334 audit(1696274066.073:158): prog-id=25 op=LOAD
Oct  2 19:14:26.083035 systemd[1]: Starting systemd-update-utmp.service...
Oct  2 19:14:26.135000 audit[1255]: SYSTEM_BOOT pid=1255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.149486 kernel: audit: type=1127 audit(1696274066.135:159): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.152855 systemd[1]: Finished systemd-update-utmp.service.
Oct  2 19:14:26.169378 kernel: audit: type=1130 audit(1696274066.154:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.180309 systemd[1]: Finished clean-ca-certificates.service.
Oct  2 19:14:26.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.183233 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Oct  2 19:14:26.195131 kernel: audit: type=1130 audit(1696274066.182:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.226223 systemd[1]: Started systemd-timesyncd.service.
Oct  2 19:14:26.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.229286 systemd[1]: Reached target time-set.target.
Oct  2 19:14:26.244463 kernel: audit: type=1130 audit(1696274066.228:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.286827 systemd-timesyncd[1253]: Contacted time server 88.81.100.130:123 (0.flatcar.pool.ntp.org).
Oct  2 19:14:26.286901 systemd-timesyncd[1253]: Initial clock synchronization to Mon 2023-10-02 19:14:26.287219 UTC.
Oct  2 19:14:26.292368 systemd-resolved[1252]: Positive Trust Anchors:
Oct  2 19:14:26.292388 systemd-resolved[1252]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 19:14:26.292429 systemd-resolved[1252]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 19:14:26.310906 systemd[1]: Finished systemd-journal-catalog-update.service.
Oct  2 19:14:26.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.329004 kernel: audit: type=1130 audit(1696274066.313:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:14:26.392000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Oct  2 19:14:26.392000 audit[1270]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff130f7ce0 a2=420 a3=0 items=0 ppid=1249 pid=1270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:14:26.392000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Oct  2 19:14:26.394240 augenrules[1270]: No rules
Oct  2 19:14:26.394668 systemd[1]: Finished audit-rules.service.
Oct  2 19:14:26.430283 systemd-resolved[1252]: Using system hostname 'ci-3510.3.0-a-e4b0ec5c33'.
Oct  2 19:14:26.431801 systemd[1]: Started systemd-resolved.service.
Oct  2 19:14:26.435200 systemd[1]: Reached target network.target.
Oct  2 19:14:26.437282 systemd[1]: Reached target network-online.target.
Oct  2 19:14:26.439641 systemd[1]: Reached target nss-lookup.target.
Oct  2 19:14:31.400994 ldconfig[1234]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Oct  2 19:14:31.412756 systemd[1]: Finished ldconfig.service.
Oct  2 19:14:31.417145 systemd[1]: Starting systemd-update-done.service...
Oct  2 19:14:31.440681 systemd[1]: Finished systemd-update-done.service.
Oct  2 19:14:31.444082 systemd[1]: Reached target sysinit.target.
Oct  2 19:14:31.446613 systemd[1]: Started motdgen.path.
Oct  2 19:14:31.448728 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Oct  2 19:14:31.452034 systemd[1]: Started logrotate.timer.
Oct  2 19:14:31.453974 systemd[1]: Started mdadm.timer.
Oct  2 19:14:31.455795 systemd[1]: Started systemd-tmpfiles-clean.timer.
Oct  2 19:14:31.458077 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Oct  2 19:14:31.458120 systemd[1]: Reached target paths.target.
Oct  2 19:14:31.460017 systemd[1]: Reached target timers.target.
Oct  2 19:14:31.462239 systemd[1]: Listening on dbus.socket.
Oct  2 19:14:31.465087 systemd[1]: Starting docker.socket...
Oct  2 19:14:31.483153 systemd[1]: Listening on sshd.socket.
Oct  2 19:14:31.485702 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 19:14:31.486273 systemd[1]: Listening on docker.socket.
Oct  2 19:14:31.490937 systemd[1]: Reached target sockets.target.
Oct  2 19:14:31.493319 systemd[1]: Reached target basic.target.
Oct  2 19:14:31.495473 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 19:14:31.495508 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 19:14:31.496520 systemd[1]: Starting containerd.service...
Oct  2 19:14:31.499499 systemd[1]: Starting dbus.service...
Oct  2 19:14:31.502327 systemd[1]: Starting enable-oem-cloudinit.service...
Oct  2 19:14:31.505971 systemd[1]: Starting extend-filesystems.service...
Oct  2 19:14:31.508017 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Oct  2 19:14:31.509253 systemd[1]: Starting motdgen.service...
Oct  2 19:14:31.512344 systemd[1]: Started nvidia.service.
Oct  2 19:14:31.515776 systemd[1]: Starting prepare-cni-plugins.service...
Oct  2 19:14:31.519179 systemd[1]: Starting prepare-critools.service...
Oct  2 19:14:31.522635 systemd[1]: Starting ssh-key-proc-cmdline.service...
Oct  2 19:14:31.526085 systemd[1]: Starting sshd-keygen.service...
Oct  2 19:14:31.531280 systemd[1]: Starting systemd-logind.service...
Oct  2 19:14:31.533490 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 19:14:31.533575 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Oct  2 19:14:31.534092 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Oct  2 19:14:31.534863 systemd[1]: Starting update-engine.service...
Oct  2 19:14:31.538238 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Oct  2 19:14:31.544405 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Oct  2 19:14:31.544632 systemd[1]: Finished ssh-key-proc-cmdline.service.
Oct  2 19:14:31.600518 jq[1292]: true
Oct  2 19:14:31.600868 jq[1280]: false
Oct  2 19:14:31.602117 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Oct  2 19:14:31.602344 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Oct  2 19:14:31.618534 extend-filesystems[1281]: Found sda
Oct  2 19:14:31.622443 extend-filesystems[1281]: Found sda1
Oct  2 19:14:31.625407 extend-filesystems[1281]: Found sda2
Oct  2 19:14:31.625407 extend-filesystems[1281]: Found sda3
Oct  2 19:14:31.625407 extend-filesystems[1281]: Found usr
Oct  2 19:14:31.625407 extend-filesystems[1281]: Found sda4
Oct  2 19:14:31.625407 extend-filesystems[1281]: Found sda6
Oct  2 19:14:31.637369 extend-filesystems[1281]: Found sda7
Oct  2 19:14:31.637369 extend-filesystems[1281]: Found sda9
Oct  2 19:14:31.637369 extend-filesystems[1281]: Checking size of /dev/sda9
Oct  2 19:14:31.628036 systemd[1]: motdgen.service: Deactivated successfully.
Oct  2 19:14:31.643911 jq[1306]: true
Oct  2 19:14:31.628221 systemd[1]: Finished motdgen.service.
Oct  2 19:14:31.679114 tar[1294]: ./
Oct  2 19:14:31.679114 tar[1294]: ./macvlan
Oct  2 19:14:31.683742 tar[1296]: crictl
Oct  2 19:14:31.695561 systemd-logind[1290]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Oct  2 19:14:31.703972 systemd-logind[1290]: New seat seat0.
Oct  2 19:14:31.754529 extend-filesystems[1281]: Old size kept for /dev/sda9
Oct  2 19:14:31.760241 extend-filesystems[1281]: Found sr0
Oct  2 19:14:31.755105 systemd[1]: extend-filesystems.service: Deactivated successfully.
Oct  2 19:14:31.755262 systemd[1]: Finished extend-filesystems.service.
Oct  2 19:14:31.799601 env[1311]: time="2023-10-02T19:14:31.799549240Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Oct  2 19:14:31.827662 bash[1329]: Updated "/home/core/.ssh/authorized_keys"
Oct  2 19:14:31.828704 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Oct  2 19:14:31.840311 tar[1294]: ./static
Oct  2 19:14:31.849745 dbus-daemon[1279]: [system] SELinux support is enabled
Oct  2 19:14:31.850612 systemd[1]: Started dbus.service.
Oct  2 19:14:31.856396 dbus-daemon[1279]: [system] Successfully activated service 'org.freedesktop.systemd1'
Oct  2 19:14:31.855837 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Oct  2 19:14:31.855864 systemd[1]: Reached target system-config.target.
Oct  2 19:14:31.858887 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Oct  2 19:14:31.858909 systemd[1]: Reached target user-config.target.
Oct  2 19:14:31.861595 systemd[1]: Started systemd-logind.service.
Oct  2 19:14:31.911024 tar[1294]: ./vlan
Oct  2 19:14:31.935218 env[1311]: time="2023-10-02T19:14:31.935126289Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Oct  2 19:14:31.935336 env[1311]: time="2023-10-02T19:14:31.935284993Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:14:31.936836 env[1311]: time="2023-10-02T19:14:31.936793728Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Oct  2 19:14:31.936836 env[1311]: time="2023-10-02T19:14:31.936833729Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:14:31.937138 env[1311]: time="2023-10-02T19:14:31.937108435Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 19:14:31.937206 env[1311]: time="2023-10-02T19:14:31.937140436Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Oct  2 19:14:31.937206 env[1311]: time="2023-10-02T19:14:31.937158936Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Oct  2 19:14:31.937206 env[1311]: time="2023-10-02T19:14:31.937172836Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Oct  2 19:14:31.937318 env[1311]: time="2023-10-02T19:14:31.937268739Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:14:31.937547 env[1311]: time="2023-10-02T19:14:31.937519545Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:14:31.937741 env[1311]: time="2023-10-02T19:14:31.937712849Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 19:14:31.937795 env[1311]: time="2023-10-02T19:14:31.937742950Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Oct  2 19:14:31.937836 env[1311]: time="2023-10-02T19:14:31.937810151Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Oct  2 19:14:31.937836 env[1311]: time="2023-10-02T19:14:31.937826552Z" level=info msg="metadata content store policy set" policy=shared
Oct  2 19:14:31.939620 systemd[1]: nvidia.service: Deactivated successfully.
Oct  2 19:14:31.958883 env[1311]: time="2023-10-02T19:14:31.958854840Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Oct  2 19:14:31.958979 env[1311]: time="2023-10-02T19:14:31.958892741Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Oct  2 19:14:31.958979 env[1311]: time="2023-10-02T19:14:31.958920042Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Oct  2 19:14:31.961076 env[1311]: time="2023-10-02T19:14:31.961050291Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Oct  2 19:14:31.961146 env[1311]: time="2023-10-02T19:14:31.961081192Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Oct  2 19:14:31.961198 env[1311]: time="2023-10-02T19:14:31.961140693Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Oct  2 19:14:31.961198 env[1311]: time="2023-10-02T19:14:31.961159294Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Oct  2 19:14:31.961198 env[1311]: time="2023-10-02T19:14:31.961179194Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Oct  2 19:14:31.961301 env[1311]: time="2023-10-02T19:14:31.961199395Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Oct  2 19:14:31.961301 env[1311]: time="2023-10-02T19:14:31.961218195Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Oct  2 19:14:31.961301 env[1311]: time="2023-10-02T19:14:31.961237795Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Oct  2 19:14:31.961301 env[1311]: time="2023-10-02T19:14:31.961254996Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Oct  2 19:14:31.961440 env[1311]: time="2023-10-02T19:14:31.961367498Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Oct  2 19:14:31.961479 env[1311]: time="2023-10-02T19:14:31.961455901Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Oct  2 19:14:31.961870 env[1311]: time="2023-10-02T19:14:31.961845210Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Oct  2 19:14:31.961960 env[1311]: time="2023-10-02T19:14:31.961895811Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.961960 env[1311]: time="2023-10-02T19:14:31.961916711Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Oct  2 19:14:31.962048 env[1311]: time="2023-10-02T19:14:31.961997313Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962048 env[1311]: time="2023-10-02T19:14:31.962017714Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962120 env[1311]: time="2023-10-02T19:14:31.962097815Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962157 env[1311]: time="2023-10-02T19:14:31.962116616Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962157 env[1311]: time="2023-10-02T19:14:31.962133516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962230 env[1311]: time="2023-10-02T19:14:31.962153117Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962230 env[1311]: time="2023-10-02T19:14:31.962176817Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962230 env[1311]: time="2023-10-02T19:14:31.962194018Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962230 env[1311]: time="2023-10-02T19:14:31.962213218Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Oct  2 19:14:31.962385 env[1311]: time="2023-10-02T19:14:31.962361022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962425 env[1311]: time="2023-10-02T19:14:31.962381722Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962425 env[1311]: time="2023-10-02T19:14:31.962398322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.962425 env[1311]: time="2023-10-02T19:14:31.962415523Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Oct  2 19:14:31.962527 env[1311]: time="2023-10-02T19:14:31.962437723Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Oct  2 19:14:31.962527 env[1311]: time="2023-10-02T19:14:31.962453724Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Oct  2 19:14:31.962527 env[1311]: time="2023-10-02T19:14:31.962477324Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Oct  2 19:14:31.962527 env[1311]: time="2023-10-02T19:14:31.962516825Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Oct  2 19:14:31.963457 env[1311]: time="2023-10-02T19:14:31.963381345Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.963469347Z" level=info msg="Connect containerd service"
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.963513548Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.964854579Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965049484Z" level=info msg="Start subscribing containerd event"
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965093085Z" level=info msg="Start recovering state"
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965151686Z" level=info msg="Start event monitor"
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965165887Z" level=info msg="Start snapshots syncer"
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965178587Z" level=info msg="Start cni network conf syncer for default"
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965189287Z" level=info msg="Start streaming server"
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965523495Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Oct  2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965592197Z" level=info msg=serving... address=/run/containerd/containerd.sock
Oct  2 19:14:31.965744 systemd[1]: Started containerd.service.
Oct  2 19:14:31.998127 env[1311]: time="2023-10-02T19:14:31.998085951Z" level=info msg="containerd successfully booted in 0.212007s"
Oct  2 19:14:32.019468 tar[1294]: ./portmap
Oct  2 19:14:32.111882 tar[1294]: ./host-local
Oct  2 19:14:32.177960 tar[1294]: ./vrf
Oct  2 19:14:32.250118 tar[1294]: ./bridge
Oct  2 19:14:32.338160 tar[1294]: ./tuning
Oct  2 19:14:32.411162 tar[1294]: ./firewall
Oct  2 19:14:32.493477 tar[1294]: ./host-device
Oct  2 19:14:32.498966 update_engine[1291]: I1002 19:14:32.481910  1291 main.cc:92] Flatcar Update Engine starting
Oct  2 19:14:32.549741 systemd[1]: Started update-engine.service.
Oct  2 19:14:32.558491 update_engine[1291]: I1002 19:14:32.558105  1291 update_check_scheduler.cc:74] Next update check in 2m20s
Oct  2 19:14:32.554919 systemd[1]: Started locksmithd.service.
Oct  2 19:14:32.560732 systemd[1]: Finished prepare-critools.service.
Oct  2 19:14:32.574927 tar[1294]: ./sbr
Oct  2 19:14:32.608360 tar[1294]: ./loopback
Oct  2 19:14:32.642835 tar[1294]: ./dhcp
Oct  2 19:14:32.713602 sshd_keygen[1302]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Oct  2 19:14:32.740529 systemd[1]: Finished sshd-keygen.service.
Oct  2 19:14:32.753220 tar[1294]: ./ptp
Oct  2 19:14:32.745296 systemd[1]: Starting issuegen.service...
Oct  2 19:14:32.749195 systemd[1]: Started waagent.service.
Oct  2 19:14:32.760280 systemd[1]: issuegen.service: Deactivated successfully.
Oct  2 19:14:32.760487 systemd[1]: Finished issuegen.service.
Oct  2 19:14:32.764493 systemd[1]: Starting systemd-user-sessions.service...
Oct  2 19:14:32.789536 tar[1294]: ./ipvlan
Oct  2 19:14:32.790530 systemd[1]: Finished systemd-user-sessions.service.
Oct  2 19:14:32.794651 systemd[1]: Started getty@tty1.service.
Oct  2 19:14:32.798459 systemd[1]: Started serial-getty@ttyS0.service.
Oct  2 19:14:32.801100 systemd[1]: Reached target getty.target.
Oct  2 19:14:32.828967 tar[1294]: ./bandwidth
Oct  2 19:14:32.901524 systemd[1]: Finished prepare-cni-plugins.service.
Oct  2 19:14:32.904560 systemd[1]: Reached target multi-user.target.
Oct  2 19:14:32.908250 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Oct  2 19:14:32.918002 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Oct  2 19:14:32.918139 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Oct  2 19:14:32.920902 systemd[1]: Startup finished in 974ms (firmware) + 25.612s (loader) + 934ms (kernel) + 21.535s (initrd) + 24.382s (userspace) = 1min 13.439s.
Oct  2 19:14:33.308267 login[1400]: pam_lastlog(login:session): file /var/log/lastlog is locked/write
Oct  2 19:14:33.308754 login[1399]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Oct  2 19:14:33.334672 systemd[1]: Created slice user-500.slice.
Oct  2 19:14:33.336122 systemd[1]: Starting user-runtime-dir@500.service...
Oct  2 19:14:33.339062 systemd-logind[1290]: New session 2 of user core.
Oct  2 19:14:33.362681 systemd[1]: Finished user-runtime-dir@500.service.
Oct  2 19:14:33.364476 systemd[1]: Starting user@500.service...
Oct  2 19:14:33.367704 (systemd)[1409]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:14:33.525067 systemd[1409]: Queued start job for default target default.target.
Oct  2 19:14:33.525765 systemd[1409]: Reached target paths.target.
Oct  2 19:14:33.525802 systemd[1409]: Reached target sockets.target.
Oct  2 19:14:33.525824 systemd[1409]: Reached target timers.target.
Oct  2 19:14:33.525843 systemd[1409]: Reached target basic.target.
Oct  2 19:14:33.526001 systemd[1]: Started user@500.service.
Oct  2 19:14:33.527438 systemd[1]: Started session-2.scope.
Oct  2 19:14:33.528130 systemd[1409]: Reached target default.target.
Oct  2 19:14:33.528357 systemd[1409]: Startup finished in 154ms.
Oct  2 19:14:33.966744 locksmithd[1385]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Oct  2 19:14:34.310041 login[1400]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Oct  2 19:14:34.314853 systemd[1]: Started session-1.scope.
Oct  2 19:14:34.315373 systemd-logind[1290]: New session 1 of user core.
Oct  2 19:14:39.342845 waagent[1394]: 2023-10-02T19:14:39.342729Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2
Oct  2 19:14:39.357106 waagent[1394]: 2023-10-02T19:14:39.344415Z INFO Daemon Daemon OS: flatcar 3510.3.0
Oct  2 19:14:39.357106 waagent[1394]: 2023-10-02T19:14:39.345490Z INFO Daemon Daemon Python: 3.9.16
Oct  2 19:14:39.357106 waagent[1394]: 2023-10-02T19:14:39.346727Z INFO Daemon Daemon Run daemon
Oct  2 19:14:39.357106 waagent[1394]: 2023-10-02T19:14:39.348034Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0'
Oct  2 19:14:39.363758 waagent[1394]: 2023-10-02T19:14:39.363636Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1.
Oct  2 19:14:39.372194 waagent[1394]: 2023-10-02T19:14:39.372082Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service'
Oct  2 19:14:39.377264 waagent[1394]: 2023-10-02T19:14:39.377195Z INFO Daemon Daemon cloud-init is enabled: False
Oct  2 19:14:39.380198 waagent[1394]: 2023-10-02T19:14:39.380138Z INFO Daemon Daemon Using waagent for provisioning
Oct  2 19:14:39.383435 waagent[1394]: 2023-10-02T19:14:39.383375Z INFO Daemon Daemon Activate resource disk
Oct  2 19:14:39.386037 waagent[1394]: 2023-10-02T19:14:39.385981Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb
Oct  2 19:14:39.396438 waagent[1394]: 2023-10-02T19:14:39.396367Z INFO Daemon Daemon Found device: None
Oct  2 19:14:39.399071 waagent[1394]: 2023-10-02T19:14:39.399012Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology
Oct  2 19:14:39.405145 waagent[1394]: 2023-10-02T19:14:39.405082Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0
Oct  2 19:14:39.411563 waagent[1394]: 2023-10-02T19:14:39.411501Z INFO Daemon Daemon Clean protocol and wireserver endpoint
Oct  2 19:14:39.414931 waagent[1394]: 2023-10-02T19:14:39.414870Z INFO Daemon Daemon Running default provisioning handler
Oct  2 19:14:39.425537 waagent[1394]: 2023-10-02T19:14:39.425414Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1.
Oct  2 19:14:39.432463 waagent[1394]: 2023-10-02T19:14:39.432361Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service'
Oct  2 19:14:39.437517 waagent[1394]: 2023-10-02T19:14:39.437458Z INFO Daemon Daemon cloud-init is enabled: False
Oct  2 19:14:39.440370 waagent[1394]: 2023-10-02T19:14:39.440312Z INFO Daemon Daemon Copying ovf-env.xml
Oct  2 19:14:39.529591 waagent[1394]: 2023-10-02T19:14:39.528330Z INFO Daemon Daemon Successfully mounted dvd
Oct  2 19:14:39.631449 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully.
Oct  2 19:14:39.650665 waagent[1394]: 2023-10-02T19:14:39.650533Z INFO Daemon Daemon Detect protocol endpoint
Oct  2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.651006Z INFO Daemon Daemon Clean protocol and wireserver endpoint
Oct  2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.652350Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler
Oct  2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.653368Z INFO Daemon Daemon Test for route to 168.63.129.16
Oct  2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.654469Z INFO Daemon Daemon Route to 168.63.129.16 exists
Oct  2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.655200Z INFO Daemon Daemon Wire server endpoint:168.63.129.16
Oct  2 19:14:39.775032 waagent[1394]: 2023-10-02T19:14:39.774936Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05
Oct  2 19:14:39.779104 waagent[1394]: 2023-10-02T19:14:39.779058Z INFO Daemon Daemon Wire protocol version:2012-11-30
Oct  2 19:14:39.781986 waagent[1394]: 2023-10-02T19:14:39.781915Z INFO Daemon Daemon Server preferred version:2015-04-05
Oct  2 19:14:40.039116 waagent[1394]: 2023-10-02T19:14:40.038876Z INFO Daemon Daemon Initializing goal state during protocol detection
Oct  2 19:14:40.049474 waagent[1394]: 2023-10-02T19:14:40.049388Z INFO Daemon Daemon Forcing an update of the goal state..
Oct  2 19:14:40.055353 waagent[1394]: 2023-10-02T19:14:40.049827Z INFO Daemon Daemon Fetching goal state [incarnation 1]
Oct  2 19:14:40.134644 waagent[1394]: 2023-10-02T19:14:40.134512Z INFO Daemon Daemon Found private key matching thumbprint 0243B914BF72F5FA761597FC9665DDFDBF6B0C48
Oct  2 19:14:40.145442 waagent[1394]: 2023-10-02T19:14:40.135153Z INFO Daemon Daemon Certificate with thumbprint F6E16FA69B1CCBBF0B06F392B672016E0D52A94A has no matching private key.
Oct  2 19:14:40.145442 waagent[1394]: 2023-10-02T19:14:40.136259Z INFO Daemon Daemon Fetch goal state completed
Oct  2 19:14:40.180768 waagent[1394]: 2023-10-02T19:14:40.180672Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: ee498198-d8fe-4826-a1ef-cc525e003f3d New eTag: 14191338123858362813]
Oct  2 19:14:40.189702 waagent[1394]: 2023-10-02T19:14:40.182402Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob
Oct  2 19:14:40.195569 waagent[1394]: 2023-10-02T19:14:40.195505Z INFO Daemon Daemon Starting provisioning
Oct  2 19:14:40.202552 waagent[1394]: 2023-10-02T19:14:40.195829Z INFO Daemon Daemon Handle ovf-env.xml.
Oct  2 19:14:40.202552 waagent[1394]: 2023-10-02T19:14:40.196787Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-e4b0ec5c33]
Oct  2 19:14:40.213967 waagent[1394]: 2023-10-02T19:14:40.213856Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-e4b0ec5c33]
Oct  2 19:14:40.221899 waagent[1394]: 2023-10-02T19:14:40.214560Z INFO Daemon Daemon Examine /proc/net/route for primary interface
Oct  2 19:14:40.221899 waagent[1394]: 2023-10-02T19:14:40.215567Z INFO Daemon Daemon Primary interface is [eth0]
Oct  2 19:14:40.228518 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully.
Oct  2 19:14:40.228771 systemd[1]: Stopped systemd-networkd-wait-online.service.
Oct  2 19:14:40.228845 systemd[1]: Stopping systemd-networkd-wait-online.service...
Oct  2 19:14:40.229191 systemd[1]: Stopping systemd-networkd.service...
Oct  2 19:14:40.233002 systemd-networkd[1165]: eth0: DHCPv6 lease lost
Oct  2 19:14:40.234514 systemd[1]: systemd-networkd.service: Deactivated successfully.
Oct  2 19:14:40.234674 systemd[1]: Stopped systemd-networkd.service.
Oct  2 19:14:40.237084 systemd[1]: Starting systemd-networkd.service...
Oct  2 19:14:40.266976 systemd-networkd[1452]: enP26643s1: Link UP
Oct  2 19:14:40.266985 systemd-networkd[1452]: enP26643s1: Gained carrier
Oct  2 19:14:40.268284 systemd-networkd[1452]: eth0: Link UP
Oct  2 19:14:40.268293 systemd-networkd[1452]: eth0: Gained carrier
Oct  2 19:14:40.268711 systemd-networkd[1452]: lo: Link UP
Oct  2 19:14:40.268720 systemd-networkd[1452]: lo: Gained carrier
Oct  2 19:14:40.269127 systemd-networkd[1452]: eth0: Gained IPv6LL
Oct  2 19:14:40.269731 systemd-networkd[1452]: Enumeration completed
Oct  2 19:14:40.269911 systemd[1]: Started systemd-networkd.service.
Oct  2 19:14:40.274498 waagent[1394]: 2023-10-02T19:14:40.270933Z INFO Daemon Daemon Create user account if not exists
Oct  2 19:14:40.272520 systemd[1]: Starting systemd-networkd-wait-online.service...
Oct  2 19:14:40.278005 waagent[1394]: 2023-10-02T19:14:40.275765Z INFO Daemon Daemon User core already exists, skip useradd
Oct  2 19:14:40.279875 waagent[1394]: 2023-10-02T19:14:40.279799Z INFO Daemon Daemon Configure sudoer
Oct  2 19:14:40.280980 waagent[1394]: 2023-10-02T19:14:40.280901Z INFO Daemon Daemon Configure sshd
Oct  2 19:14:40.283980 waagent[1394]: 2023-10-02T19:14:40.283917Z INFO Daemon Daemon Deploy ssh public key.
Oct  2 19:14:40.289578 systemd-networkd[1452]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 19:14:40.327053 systemd-networkd[1452]: eth0: DHCPv4 address 10.200.8.37/24, gateway 10.200.8.1 acquired from 168.63.129.16
Oct  2 19:14:40.330646 systemd[1]: Finished systemd-networkd-wait-online.service.
Oct  2 19:14:41.579495 waagent[1394]: 2023-10-02T19:14:41.579393Z INFO Daemon Daemon Provisioning complete
Oct  2 19:14:41.598345 waagent[1394]: 2023-10-02T19:14:41.598270Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping
Oct  2 19:14:41.607515 waagent[1394]: 2023-10-02T19:14:41.607434Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions.
Oct  2 19:14:41.613276 waagent[1394]: 2023-10-02T19:14:41.613208Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent
Oct  2 19:14:41.877224 waagent[1461]: 2023-10-02T19:14:41.877123Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent
Oct  2 19:14:41.878006 waagent[1461]: 2023-10-02T19:14:41.877925Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 19:14:41.878168 waagent[1461]: 2023-10-02T19:14:41.878113Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 19:14:41.888771 waagent[1461]: 2023-10-02T19:14:41.888696Z INFO ExtHandler ExtHandler Forcing an update of the goal state..
Oct  2 19:14:41.888933 waagent[1461]: 2023-10-02T19:14:41.888879Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1]
Oct  2 19:14:41.949464 waagent[1461]: 2023-10-02T19:14:41.949339Z INFO ExtHandler ExtHandler Found private key matching thumbprint 0243B914BF72F5FA761597FC9665DDFDBF6B0C48
Oct  2 19:14:41.949687 waagent[1461]: 2023-10-02T19:14:41.949624Z INFO ExtHandler ExtHandler Certificate with thumbprint F6E16FA69B1CCBBF0B06F392B672016E0D52A94A has no matching private key.
Oct  2 19:14:41.949923 waagent[1461]: 2023-10-02T19:14:41.949872Z INFO ExtHandler ExtHandler Fetch goal state completed
Oct  2 19:14:41.963929 waagent[1461]: 2023-10-02T19:14:41.963869Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: a1f2d03e-573a-4095-b07f-6256534699ba New eTag: 14191338123858362813]
Oct  2 19:14:41.964511 waagent[1461]: 2023-10-02T19:14:41.964456Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob
Oct  2 19:14:42.054844 waagent[1461]: 2023-10-02T19:14:42.054671Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1;
Oct  2 19:14:42.064933 waagent[1461]: 2023-10-02T19:14:42.064838Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1461
Oct  2 19:14:42.068403 waagent[1461]: 2023-10-02T19:14:42.068333Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk']
Oct  2 19:14:42.069624 waagent[1461]: 2023-10-02T19:14:42.069564Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Oct  2 19:14:42.144053 waagent[1461]: 2023-10-02T19:14:42.143914Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service
Oct  2 19:14:42.144423 waagent[1461]: 2023-10-02T19:14:42.144358Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup
Oct  2 19:14:42.152417 waagent[1461]: 2023-10-02T19:14:42.152359Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now
Oct  2 19:14:42.152874 waagent[1461]: 2023-10-02T19:14:42.152817Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service'
Oct  2 19:14:42.153915 waagent[1461]: 2023-10-02T19:14:42.153851Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True]
Oct  2 19:14:42.155203 waagent[1461]: 2023-10-02T19:14:42.155142Z INFO ExtHandler ExtHandler Starting env monitor service.
Oct  2 19:14:42.155939 waagent[1461]: 2023-10-02T19:14:42.155883Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Oct  2 19:14:42.156068 waagent[1461]: 2023-10-02T19:14:42.156004Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 19:14:42.156665 waagent[1461]: 2023-10-02T19:14:42.156611Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 19:14:42.156894 waagent[1461]: 2023-10-02T19:14:42.156839Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Oct  2 19:14:42.157151 waagent[1461]: 2023-10-02T19:14:42.157100Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Oct  2 19:14:42.157920 waagent[1461]: 2023-10-02T19:14:42.157865Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Oct  2 19:14:42.158035 waagent[1461]: 2023-10-02T19:14:42.157975Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 19:14:42.159278 waagent[1461]: 2023-10-02T19:14:42.159220Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Oct  2 19:14:42.159511 waagent[1461]: 2023-10-02T19:14:42.159445Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Oct  2 19:14:42.159638 waagent[1461]: 2023-10-02T19:14:42.159582Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Oct  2 19:14:42.159638 waagent[1461]: Iface        Destination        Gateway         Flags        RefCnt        Use        Metric        Mask                MTU        Window        IRTT
Oct  2 19:14:42.159638 waagent[1461]: eth0        00000000        0108C80A        0003        0        0        1024        00000000        0        0        0
Oct  2 19:14:42.159638 waagent[1461]: eth0        0008C80A        00000000        0001        0        0        1024        00FFFFFF        0        0        0
Oct  2 19:14:42.159638 waagent[1461]: eth0        0108C80A        00000000        0005        0        0        1024        FFFFFFFF        0        0        0
Oct  2 19:14:42.159638 waagent[1461]: eth0        10813FA8        0108C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Oct  2 19:14:42.159638 waagent[1461]: eth0        FEA9FEA9        0108C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Oct  2 19:14:42.160126 waagent[1461]: 2023-10-02T19:14:42.160072Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 19:14:42.161494 waagent[1461]: 2023-10-02T19:14:42.161443Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Oct  2 19:14:42.167056 waagent[1461]: 2023-10-02T19:14:42.166997Z INFO EnvHandler ExtHandler Configure routes
Oct  2 19:14:42.170313 waagent[1461]: 2023-10-02T19:14:42.170242Z INFO EnvHandler ExtHandler Gateway:None
Oct  2 19:14:42.171276 waagent[1461]: 2023-10-02T19:14:42.171218Z INFO EnvHandler ExtHandler Routes:None
Oct  2 19:14:42.172595 waagent[1461]: 2023-10-02T19:14:42.172547Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct  2 19:14:42.173865 waagent[1461]: 2023-10-02T19:14:42.173819Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required
Oct  2 19:14:42.178875 waagent[1461]: 2023-10-02T19:14:42.178735Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders'
Oct  2 19:14:42.193248 waagent[1461]: 2023-10-02T19:14:42.192881Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1452'
Oct  2 19:14:42.222604 waagent[1461]: 2023-10-02T19:14:42.222529Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel.
Oct  2 19:14:42.299477 waagent[1461]: 2023-10-02T19:14:42.298346Z INFO MonitorHandler ExtHandler Network interfaces:
Oct  2 19:14:42.299477 waagent[1461]: Executing ['ip', '-a', '-o', 'link']:
Oct  2 19:14:42.299477 waagent[1461]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Oct  2 19:14:42.299477 waagent[1461]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:a4:76:8d brd ff:ff:ff:ff:ff:ff
Oct  2 19:14:42.299477 waagent[1461]: 3: enP26643s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:a4:76:8d brd ff:ff:ff:ff:ff:ff\    altname enP26643p0s2
Oct  2 19:14:42.299477 waagent[1461]: Executing ['ip', '-4', '-a', '-o', 'address']:
Oct  2 19:14:42.299477 waagent[1461]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Oct  2 19:14:42.299477 waagent[1461]: 2: eth0    inet 10.200.8.37/24 metric 1024 brd 10.200.8.255 scope global eth0\       valid_lft forever preferred_lft forever
Oct  2 19:14:42.299477 waagent[1461]: Executing ['ip', '-6', '-a', '-o', 'address']:
Oct  2 19:14:42.299477 waagent[1461]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Oct  2 19:14:42.299477 waagent[1461]: 2: eth0    inet6 fe80::222:48ff:fea4:768d/64 scope link \       valid_lft forever preferred_lft forever
Oct  2 19:14:42.537624 waagent[1461]: 2023-10-02T19:14:42.537459Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules
Oct  2 19:14:42.542716 waagent[1461]: 2023-10-02T19:14:42.542598Z INFO EnvHandler ExtHandler Firewall rules:
Oct  2 19:14:42.542716 waagent[1461]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
Oct  2 19:14:42.542716 waagent[1461]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 19:14:42.542716 waagent[1461]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
Oct  2 19:14:42.542716 waagent[1461]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 19:14:42.542716 waagent[1461]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
Oct  2 19:14:42.542716 waagent[1461]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 19:14:42.542716 waagent[1461]:        0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        owner UID match 0
Oct  2 19:14:42.542716 waagent[1461]:        0        0 DROP       tcp  --  *      *       0.0.0.0/0            168.63.129.16        ctstate INVALID,NEW
Oct  2 19:14:42.544400 waagent[1461]: 2023-10-02T19:14:42.544339Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300
Oct  2 19:14:42.740199 waagent[1461]: 2023-10-02T19:14:42.740120Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.3 -- exiting
Oct  2 19:14:43.618084 waagent[1394]: 2023-10-02T19:14:43.617872Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running
Oct  2 19:14:43.624507 waagent[1394]: 2023-10-02T19:14:43.624441Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.3 to be the latest agent
Oct  2 19:14:44.607184 waagent[1500]: 2023-10-02T19:14:44.607068Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.3)
Oct  2 19:14:44.607883 waagent[1500]: 2023-10-02T19:14:44.607816Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0
Oct  2 19:14:44.608044 waagent[1500]: 2023-10-02T19:14:44.607989Z INFO ExtHandler ExtHandler Python: 3.9.16
Oct  2 19:14:44.617426 waagent[1500]: 2023-10-02T19:14:44.617313Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1;
Oct  2 19:14:44.617840 waagent[1500]: 2023-10-02T19:14:44.617778Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 19:14:44.618018 waagent[1500]: 2023-10-02T19:14:44.617968Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 19:14:44.629731 waagent[1500]: 2023-10-02T19:14:44.629652Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1]
Oct  2 19:14:44.637825 waagent[1500]: 2023-10-02T19:14:44.637757Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143
Oct  2 19:14:44.638753 waagent[1500]: 2023-10-02T19:14:44.638692Z INFO ExtHandler
Oct  2 19:14:44.638903 waagent[1500]: 2023-10-02T19:14:44.638850Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 50b3eaa0-46be-4ca5-9e53-4b2c95ee455d eTag: 14191338123858362813 source: Fabric]
Oct  2 19:14:44.639599 waagent[1500]: 2023-10-02T19:14:44.639541Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them.
Oct  2 19:14:44.640678 waagent[1500]: 2023-10-02T19:14:44.640618Z INFO ExtHandler
Oct  2 19:14:44.640811 waagent[1500]: 2023-10-02T19:14:44.640759Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1]
Oct  2 19:14:44.647231 waagent[1500]: 2023-10-02T19:14:44.647179Z INFO ExtHandler ExtHandler Downloading artifacts profile blob
Oct  2 19:14:44.647665 waagent[1500]: 2023-10-02T19:14:44.647615Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required
Oct  2 19:14:44.669127 waagent[1500]: 2023-10-02T19:14:44.669057Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel.
Oct  2 19:14:44.735003 waagent[1500]: 2023-10-02T19:14:44.734857Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F6E16FA69B1CCBBF0B06F392B672016E0D52A94A', 'hasPrivateKey': False}
Oct  2 19:14:44.735971 waagent[1500]: 2023-10-02T19:14:44.735895Z INFO ExtHandler Downloaded certificate {'thumbprint': '0243B914BF72F5FA761597FC9665DDFDBF6B0C48', 'hasPrivateKey': True}
Oct  2 19:14:44.736950 waagent[1500]: 2023-10-02T19:14:44.736879Z INFO ExtHandler Fetch goal state completed
Oct  2 19:14:44.760116 waagent[1500]: 2023-10-02T19:14:44.760035Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.3 running as process 1500
Oct  2 19:14:44.763475 waagent[1500]: 2023-10-02T19:14:44.763406Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk']
Oct  2 19:14:44.764935 waagent[1500]: 2023-10-02T19:14:44.764875Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Oct  2 19:14:44.769841 waagent[1500]: 2023-10-02T19:14:44.769788Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service
Oct  2 19:14:44.770244 waagent[1500]: 2023-10-02T19:14:44.770188Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup
Oct  2 19:14:44.777994 waagent[1500]: 2023-10-02T19:14:44.777922Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now
Oct  2 19:14:44.778457 waagent[1500]: 2023-10-02T19:14:44.778400Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service'
Oct  2 19:14:44.801007 waagent[1500]: 2023-10-02T19:14:44.800884Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now.
Oct  2 19:14:44.803721 waagent[1500]: 2023-10-02T19:14:44.803624Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver
Oct  2 19:14:44.809053 waagent[1500]: 2023-10-02T19:14:44.808990Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True]
Oct  2 19:14:44.810431 waagent[1500]: 2023-10-02T19:14:44.810373Z INFO ExtHandler ExtHandler Starting env monitor service.
Oct  2 19:14:44.810835 waagent[1500]: 2023-10-02T19:14:44.810779Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 19:14:44.811015 waagent[1500]: 2023-10-02T19:14:44.810954Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 19:14:44.811690 waagent[1500]: 2023-10-02T19:14:44.811633Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 19:14:44.812262 waagent[1500]: 2023-10-02T19:14:44.812203Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Oct  2 19:14:44.812340 waagent[1500]: 2023-10-02T19:14:44.812287Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Oct  2 19:14:44.812784 waagent[1500]: 2023-10-02T19:14:44.812722Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Oct  2 19:14:44.813050 waagent[1500]: 2023-10-02T19:14:44.812995Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Oct  2 19:14:44.813435 waagent[1500]: 2023-10-02T19:14:44.813383Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 19:14:44.813795 waagent[1500]: 2023-10-02T19:14:44.813742Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Oct  2 19:14:44.813795 waagent[1500]: Iface        Destination        Gateway         Flags        RefCnt        Use        Metric        Mask                MTU        Window        IRTT
Oct  2 19:14:44.813795 waagent[1500]: eth0        00000000        0108C80A        0003        0        0        1024        00000000        0        0        0
Oct  2 19:14:44.813795 waagent[1500]: eth0        0008C80A        00000000        0001        0        0        1024        00FFFFFF        0        0        0
Oct  2 19:14:44.813795 waagent[1500]: eth0        0108C80A        00000000        0005        0        0        1024        FFFFFFFF        0        0        0
Oct  2 19:14:44.813795 waagent[1500]: eth0        10813FA8        0108C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Oct  2 19:14:44.813795 waagent[1500]: eth0        FEA9FEA9        0108C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Oct  2 19:14:44.814240 waagent[1500]: 2023-10-02T19:14:44.814162Z INFO EnvHandler ExtHandler Configure routes
Oct  2 19:14:44.819039 waagent[1500]: 2023-10-02T19:14:44.818959Z INFO EnvHandler ExtHandler Gateway:None
Oct  2 19:14:44.819913 waagent[1500]: 2023-10-02T19:14:44.819856Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Oct  2 19:14:44.820016 waagent[1500]: 2023-10-02T19:14:44.819965Z INFO EnvHandler ExtHandler Routes:None
Oct  2 19:14:44.820531 waagent[1500]: 2023-10-02T19:14:44.820476Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Oct  2 19:14:44.822215 waagent[1500]: 2023-10-02T19:14:44.822159Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Oct  2 19:14:44.832386 waagent[1500]: 2023-10-02T19:14:44.832321Z INFO ExtHandler ExtHandler Downloading agent manifest
Oct  2 19:14:44.844391 waagent[1500]: 2023-10-02T19:14:44.844325Z INFO MonitorHandler ExtHandler Network interfaces:
Oct  2 19:14:44.844391 waagent[1500]: Executing ['ip', '-a', '-o', 'link']:
Oct  2 19:14:44.844391 waagent[1500]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Oct  2 19:14:44.844391 waagent[1500]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:a4:76:8d brd ff:ff:ff:ff:ff:ff
Oct  2 19:14:44.844391 waagent[1500]: 3: enP26643s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:a4:76:8d brd ff:ff:ff:ff:ff:ff\    altname enP26643p0s2
Oct  2 19:14:44.844391 waagent[1500]: Executing ['ip', '-4', '-a', '-o', 'address']:
Oct  2 19:14:44.844391 waagent[1500]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Oct  2 19:14:44.844391 waagent[1500]: 2: eth0    inet 10.200.8.37/24 metric 1024 brd 10.200.8.255 scope global eth0\       valid_lft forever preferred_lft forever
Oct  2 19:14:44.844391 waagent[1500]: Executing ['ip', '-6', '-a', '-o', 'address']:
Oct  2 19:14:44.844391 waagent[1500]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Oct  2 19:14:44.844391 waagent[1500]: 2: eth0    inet6 fe80::222:48ff:fea4:768d/64 scope link \       valid_lft forever preferred_lft forever
Oct  2 19:14:44.851071 waagent[1500]: 2023-10-02T19:14:44.851009Z INFO ExtHandler ExtHandler
Oct  2 19:14:44.855621 waagent[1500]: 2023-10-02T19:14:44.855526Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 4d891c23-b738-4748-859f-a651b5e9f338 correlation 28507787-d291-4294-a005-c0ca963fb4fc created: 2023-10-02T19:13:07.285156Z]
Oct  2 19:14:44.860642 waagent[1500]: 2023-10-02T19:14:44.860547Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything.
Oct  2 19:14:44.864715 waagent[1500]: 2023-10-02T19:14:44.864660Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 13 ms]
Oct  2 19:14:44.888922 waagent[1500]: 2023-10-02T19:14:44.888843Z INFO ExtHandler ExtHandler Looking for existing remote access users.
Oct  2 19:14:44.917585 waagent[1500]: 2023-10-02T19:14:44.917468Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.3 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 07209E6E-58C4-4200-85BE-32B2BF2B0D77;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct  2 19:14:44.935731 waagent[1500]: 2023-10-02T19:14:44.935660Z INFO EnvHandler ExtHandler Current Firewall rules:
Oct  2 19:14:44.935731 waagent[1500]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
Oct  2 19:14:44.935731 waagent[1500]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 19:14:44.935731 waagent[1500]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
Oct  2 19:14:44.935731 waagent[1500]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 19:14:44.935731 waagent[1500]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
Oct  2 19:14:44.935731 waagent[1500]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 19:14:44.935731 waagent[1500]:        0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        tcp dpt:53
Oct  2 19:14:44.935731 waagent[1500]:       15     1572 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        owner UID match 0
Oct  2 19:14:44.935731 waagent[1500]:        0        0 DROP       tcp  --  *      *       0.0.0.0/0            168.63.129.16        ctstate INVALID,NEW
Oct  2 19:15:10.012721 kernel: hv_balloon: Max. dynamic memory size: 8192 MB
Oct  2 19:15:14.094860 systemd[1]: Created slice system-sshd.slice.
Oct  2 19:15:14.096745 systemd[1]: Started sshd@0-10.200.8.37:22-10.200.12.6:51990.service.
Oct  2 19:15:14.946474 sshd[1539]: Accepted publickey for core from 10.200.12.6 port 51990 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:15:14.947868 sshd[1539]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:15:14.952019 systemd-logind[1290]: New session 3 of user core.
Oct  2 19:15:14.952821 systemd[1]: Started session-3.scope.
Oct  2 19:15:15.496708 systemd[1]: Started sshd@1-10.200.8.37:22-10.200.12.6:52006.service.
Oct  2 19:15:16.109242 sshd[1544]: Accepted publickey for core from 10.200.12.6 port 52006 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:15:16.110910 sshd[1544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:15:16.116492 systemd[1]: Started session-4.scope.
Oct  2 19:15:16.117070 systemd-logind[1290]: New session 4 of user core.
Oct  2 19:15:16.550087 sshd[1544]: pam_unix(sshd:session): session closed for user core
Oct  2 19:15:16.553316 systemd[1]: sshd@1-10.200.8.37:22-10.200.12.6:52006.service: Deactivated successfully.
Oct  2 19:15:16.554332 systemd[1]: session-4.scope: Deactivated successfully.
Oct  2 19:15:16.555095 systemd-logind[1290]: Session 4 logged out. Waiting for processes to exit.
Oct  2 19:15:16.556013 systemd-logind[1290]: Removed session 4.
Oct  2 19:15:16.665452 systemd[1]: Started sshd@2-10.200.8.37:22-10.200.12.6:52012.service.
Oct  2 19:15:17.285041 sshd[1550]: Accepted publickey for core from 10.200.12.6 port 52012 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:15:17.286662 sshd[1550]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:15:17.292095 systemd[1]: Started session-5.scope.
Oct  2 19:15:17.292542 systemd-logind[1290]: New session 5 of user core.
Oct  2 19:15:17.720204 sshd[1550]: pam_unix(sshd:session): session closed for user core
Oct  2 19:15:17.723413 systemd[1]: sshd@2-10.200.8.37:22-10.200.12.6:52012.service: Deactivated successfully.
Oct  2 19:15:17.724402 systemd[1]: session-5.scope: Deactivated successfully.
Oct  2 19:15:17.725168 systemd-logind[1290]: Session 5 logged out. Waiting for processes to exit.
Oct  2 19:15:17.726072 systemd-logind[1290]: Removed session 5.
Oct  2 19:15:17.824795 systemd[1]: Started sshd@3-10.200.8.37:22-10.200.12.6:36400.service.
Oct  2 19:15:18.069924 update_engine[1291]: I1002 19:15:18.069411  1291 update_attempter.cc:505] Updating boot flags...
Oct  2 19:15:18.440773 sshd[1556]: Accepted publickey for core from 10.200.12.6 port 36400 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:15:18.442382 sshd[1556]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:15:18.448016 systemd[1]: Started session-6.scope.
Oct  2 19:15:18.448754 systemd-logind[1290]: New session 6 of user core.
Oct  2 19:15:18.881622 sshd[1556]: pam_unix(sshd:session): session closed for user core
Oct  2 19:15:18.884858 systemd[1]: sshd@3-10.200.8.37:22-10.200.12.6:36400.service: Deactivated successfully.
Oct  2 19:15:18.885877 systemd[1]: session-6.scope: Deactivated successfully.
Oct  2 19:15:18.886685 systemd-logind[1290]: Session 6 logged out. Waiting for processes to exit.
Oct  2 19:15:18.887646 systemd-logind[1290]: Removed session 6.
Oct  2 19:15:18.987584 systemd[1]: Started sshd@4-10.200.8.37:22-10.200.12.6:36412.service.
Oct  2 19:15:19.608492 sshd[1628]: Accepted publickey for core from 10.200.12.6 port 36412 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:15:19.610137 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:15:19.614821 systemd[1]: Started session-7.scope.
Oct  2 19:15:19.615421 systemd-logind[1290]: New session 7 of user core.
Oct  2 19:15:20.254732 sudo[1631]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Oct  2 19:15:20.255092 sudo[1631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:15:20.276151 dbus-daemon[1279]: \xd0m2X\u0013V:  received setenforce notice (enforcing=675341952)
Oct  2 19:15:20.277936 sudo[1631]: pam_unix(sudo:session): session closed for user root
Oct  2 19:15:20.559924 sshd[1628]: pam_unix(sshd:session): session closed for user core
Oct  2 19:15:20.563811 systemd[1]: sshd@4-10.200.8.37:22-10.200.12.6:36412.service: Deactivated successfully.
Oct  2 19:15:20.564929 systemd[1]: session-7.scope: Deactivated successfully.
Oct  2 19:15:20.565754 systemd-logind[1290]: Session 7 logged out. Waiting for processes to exit.
Oct  2 19:15:20.566739 systemd-logind[1290]: Removed session 7.
Oct  2 19:15:20.766900 systemd[1]: Started sshd@5-10.200.8.37:22-10.200.12.6:36416.service.
Oct  2 19:15:21.471801 sshd[1635]: Accepted publickey for core from 10.200.12.6 port 36416 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:15:21.473477 sshd[1635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:15:21.478585 systemd[1]: Started session-8.scope.
Oct  2 19:15:21.479059 systemd-logind[1290]: New session 8 of user core.
Oct  2 19:15:21.812464 sudo[1642]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Oct  2 19:15:21.813040 sudo[1642]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:15:21.815631 sudo[1642]: pam_unix(sudo:session): session closed for user root
Oct  2 19:15:21.820238 sudo[1641]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Oct  2 19:15:21.820491 sudo[1641]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:15:21.828919 systemd[1]: Stopping audit-rules.service...
Oct  2 19:15:21.829000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 19:15:21.830763 auditctl[1645]: No rules
Oct  2 19:15:21.833680 kernel: kauditd_printk_skb: 3 callbacks suppressed
Oct  2 19:15:21.833749 kernel: audit: type=1305 audit(1696274121.829:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 19:15:21.831193 systemd[1]: audit-rules.service: Deactivated successfully.
Oct  2 19:15:21.831354 systemd[1]: Stopped audit-rules.service.
Oct  2 19:15:21.833426 systemd[1]: Starting audit-rules.service...
Oct  2 19:15:21.829000 audit[1645]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd17e40d90 a2=420 a3=0 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:21.854531 augenrules[1662]: No rules
Oct  2 19:15:21.829000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Oct  2 19:15:21.855280 systemd[1]: Finished audit-rules.service.
Oct  2 19:15:21.856253 sudo[1641]: pam_unix(sudo:session): session closed for user root
Oct  2 19:15:21.861847 kernel: audit: type=1300 audit(1696274121.829:165): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd17e40d90 a2=420 a3=0 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:21.861985 kernel: audit: type=1327 audit(1696274121.829:165): proctitle=2F7362696E2F617564697463746C002D44
Oct  2 19:15:21.862039 kernel: audit: type=1131 audit(1696274121.830:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:21.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:21.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:21.884115 kernel: audit: type=1130 audit(1696274121.854:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:21.884172 kernel: audit: type=1106 audit(1696274121.855:168): pid=1641 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:21.855000 audit[1641]: USER_END pid=1641 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:21.855000 audit[1641]: CRED_DISP pid=1641 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:21.907924 kernel: audit: type=1104 audit(1696274121.855:169): pid=1641 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:21.955538 sshd[1635]: pam_unix(sshd:session): session closed for user core
Oct  2 19:15:21.956000 audit[1635]: USER_END pid=1635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:15:21.959171 systemd[1]: sshd@5-10.200.8.37:22-10.200.12.6:36416.service: Deactivated successfully.
Oct  2 19:15:21.960135 systemd[1]: session-8.scope: Deactivated successfully.
Oct  2 19:15:21.961493 systemd-logind[1290]: Session 8 logged out. Waiting for processes to exit.
Oct  2 19:15:21.962552 systemd-logind[1290]: Removed session 8.
Oct  2 19:15:21.956000 audit[1635]: CRED_DISP pid=1635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:15:21.973961 kernel: audit: type=1106 audit(1696274121.956:170): pid=1635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:15:21.974013 kernel: audit: type=1104 audit(1696274121.956:171): pid=1635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:15:21.985956 kernel: audit: type=1131 audit(1696274121.956:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.37:22-10.200.12.6:36416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:21.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.37:22-10.200.12.6:36416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:22.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.37:22-10.200.12.6:36422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:22.061543 systemd[1]: Started sshd@6-10.200.8.37:22-10.200.12.6:36422.service.
Oct  2 19:15:22.903000 audit[1668]: USER_ACCT pid=1668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:15:22.904358 sshd[1668]: Accepted publickey for core from 10.200.12.6 port 36422 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:15:22.904000 audit[1668]: CRED_ACQ pid=1668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:15:22.904000 audit[1668]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed34db100 a2=3 a3=0 items=0 ppid=1 pid=1668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:22.904000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:15:22.906013 sshd[1668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:15:22.911571 systemd[1]: Started session-9.scope.
Oct  2 19:15:22.912443 systemd-logind[1290]: New session 9 of user core.
Oct  2 19:15:22.915000 audit[1668]: USER_START pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:15:22.917000 audit[1670]: CRED_ACQ pid=1670 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:15:23.246000 audit[1671]: USER_ACCT pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:23.247000 audit[1671]: CRED_REFR pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:23.248023 sudo[1671]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Oct  2 19:15:23.248357 sudo[1671]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:15:23.249000 audit[1671]: USER_START pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:24.308719 systemd[1]: Starting docker.service...
Oct  2 19:15:24.345732 env[1686]: time="2023-10-02T19:15:24.345667714Z" level=info msg="Starting up"
Oct  2 19:15:24.347111 env[1686]: time="2023-10-02T19:15:24.347082216Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Oct  2 19:15:24.347229 env[1686]: time="2023-10-02T19:15:24.347217316Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Oct  2 19:15:24.347289 env[1686]: time="2023-10-02T19:15:24.347278416Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Oct  2 19:15:24.347329 env[1686]: time="2023-10-02T19:15:24.347320916Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Oct  2 19:15:24.349062 env[1686]: time="2023-10-02T19:15:24.349034817Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Oct  2 19:15:24.349062 env[1686]: time="2023-10-02T19:15:24.349051517Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Oct  2 19:15:24.349217 env[1686]: time="2023-10-02T19:15:24.349074317Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Oct  2 19:15:24.349217 env[1686]: time="2023-10-02T19:15:24.349086517Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Oct  2 19:15:24.461862 env[1686]: time="2023-10-02T19:15:24.461820403Z" level=info msg="Loading containers: start."
Oct  2 19:15:24.498000 audit[1713]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.498000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff20785df0 a2=0 a3=7fff20785ddc items=0 ppid=1686 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.498000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552
Oct  2 19:15:24.500000 audit[1715]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.500000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd1be20280 a2=0 a3=7ffd1be2026c items=0 ppid=1686 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.500000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552
Oct  2 19:15:24.502000 audit[1717]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.502000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd00ee1fa0 a2=0 a3=7ffd00ee1f8c items=0 ppid=1686 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.502000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31
Oct  2 19:15:24.503000 audit[1719]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.503000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe8e1713e0 a2=0 a3=7ffe8e1713cc items=0 ppid=1686 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.503000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32
Oct  2 19:15:24.505000 audit[1721]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.505000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe457dfad0 a2=0 a3=7ffe457dfabc items=0 ppid=1686 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.505000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E
Oct  2 19:15:24.507000 audit[1723]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.507000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe9820dfd0 a2=0 a3=7ffe9820dfbc items=0 ppid=1686 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.507000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E
Oct  2 19:15:24.524000 audit[1725]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.524000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffab517d80 a2=0 a3=7fffab517d6c items=0 ppid=1686 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.524000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552
Oct  2 19:15:24.526000 audit[1727]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.526000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe16855680 a2=0 a3=7ffe1685566c items=0 ppid=1686 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.526000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E
Oct  2 19:15:24.528000 audit[1729]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.528000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe2f143930 a2=0 a3=7ffe2f14391c items=0 ppid=1686 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.528000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:15:24.544000 audit[1733]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.544000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff0109b3c0 a2=0 a3=7fff0109b3ac items=0 ppid=1686 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:15:24.545000 audit[1734]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.545000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffbce9e1f0 a2=0 a3=7fffbce9e1dc items=0 ppid=1686 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.545000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:15:24.598967 kernel: Initializing XFRM netlink socket
Oct  2 19:15:24.654188 env[1686]: time="2023-10-02T19:15:24.654132649Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address"
Oct  2 19:15:24.717000 audit[1741]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.717000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffb1f76730 a2=0 a3=7fffb1f7671c items=0 ppid=1686 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.717000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445
Oct  2 19:15:24.743000 audit[1744]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.743000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc3361cbd0 a2=0 a3=7ffc3361cbbc items=0 ppid=1686 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E
Oct  2 19:15:24.747000 audit[1747]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.747000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffba10bc80 a2=0 a3=7fffba10bc6c items=0 ppid=1686 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.747000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054
Oct  2 19:15:24.749000 audit[1749]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.749000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff9b38ae20 a2=0 a3=7fff9b38ae0c items=0 ppid=1686 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054
Oct  2 19:15:24.751000 audit[1751]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.751000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd527d9230 a2=0 a3=7ffd527d921c items=0 ppid=1686 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552
Oct  2 19:15:24.753000 audit[1753]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.753000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd5235ae30 a2=0 a3=7ffd5235ae1c items=0 ppid=1686 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38
Oct  2 19:15:24.755000 audit[1755]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.755000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff58e22980 a2=0 a3=7fff58e2296c items=0 ppid=1686 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552
Oct  2 19:15:24.757000 audit[1757]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.757000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd522ea6e0 a2=0 a3=7ffd522ea6cc items=0 ppid=1686 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054
Oct  2 19:15:24.759000 audit[1759]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.759000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc80fc6250 a2=0 a3=7ffc80fc623c items=0 ppid=1686 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31
Oct  2 19:15:24.760000 audit[1761]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.760000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffea995d760 a2=0 a3=7ffea995d74c items=0 ppid=1686 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32
Oct  2 19:15:24.762000 audit[1763]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.762000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffaadf9b50 a2=0 a3=7fffaadf9b3c items=0 ppid=1686 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50
Oct  2 19:15:24.764278 systemd-networkd[1452]: docker0: Link UP
Oct  2 19:15:24.782000 audit[1767]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.782000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc13c5fc00 a2=0 a3=7ffc13c5fbec items=0 ppid=1686 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.782000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:15:24.783000 audit[1768]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:24.783000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc9b5757b0 a2=0 a3=7ffc9b57579c items=0 ppid=1686 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:24.783000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:15:24.785086 env[1686]: time="2023-10-02T19:15:24.785054648Z" level=info msg="Loading containers: done."
Oct  2 19:15:24.826141 env[1686]: time="2023-10-02T19:15:24.826091279Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2
Oct  2 19:15:24.826411 env[1686]: time="2023-10-02T19:15:24.826353579Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23
Oct  2 19:15:24.826522 env[1686]: time="2023-10-02T19:15:24.826497780Z" level=info msg="Daemon has completed initialization"
Oct  2 19:15:24.855182 systemd[1]: Started docker.service.
Oct  2 19:15:24.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:24.865257 env[1686]: time="2023-10-02T19:15:24.865189209Z" level=info msg="API listen on /run/docker.sock"
Oct  2 19:15:24.882638 systemd[1]: Reloading.
Oct  2 19:15:24.970255 /usr/lib/systemd/system-generators/torcx-generator[1821]: time="2023-10-02T19:15:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:15:24.970720 /usr/lib/systemd/system-generators/torcx-generator[1821]: time="2023-10-02T19:15:24Z" level=info msg="torcx already run"
Oct  2 19:15:25.051445 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:15:25.051467 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:15:25.069666 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:15:25.133000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.133000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.133000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.133000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.133000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.133000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.133000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.133000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.133000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.134000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.134000 audit: BPF prog-id=32 op=LOAD
Oct  2 19:15:25.134000 audit: BPF prog-id=31 op=UNLOAD
Oct  2 19:15:25.134000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit: BPF prog-id=33 op=LOAD
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.135000 audit: BPF prog-id=34 op=LOAD
Oct  2 19:15:25.135000 audit: BPF prog-id=18 op=UNLOAD
Oct  2 19:15:25.135000 audit: BPF prog-id=19 op=UNLOAD
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.136000 audit: BPF prog-id=35 op=LOAD
Oct  2 19:15:25.136000 audit: BPF prog-id=29 op=UNLOAD
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit: BPF prog-id=36 op=LOAD
Oct  2 19:15:25.137000 audit: BPF prog-id=25 op=UNLOAD
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.137000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.138000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.138000 audit: BPF prog-id=37 op=LOAD
Oct  2 19:15:25.138000 audit: BPF prog-id=24 op=UNLOAD
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit: BPF prog-id=38 op=LOAD
Oct  2 19:15:25.142000 audit: BPF prog-id=26 op=UNLOAD
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit: BPF prog-id=39 op=LOAD
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.142000 audit: BPF prog-id=40 op=LOAD
Oct  2 19:15:25.142000 audit: BPF prog-id=27 op=UNLOAD
Oct  2 19:15:25.143000 audit: BPF prog-id=28 op=UNLOAD
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit: BPF prog-id=41 op=LOAD
Oct  2 19:15:25.144000 audit: BPF prog-id=21 op=UNLOAD
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit: BPF prog-id=42 op=LOAD
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.144000 audit: BPF prog-id=43 op=LOAD
Oct  2 19:15:25.144000 audit: BPF prog-id=22 op=UNLOAD
Oct  2 19:15:25.144000 audit: BPF prog-id=23 op=UNLOAD
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit: BPF prog-id=44 op=LOAD
Oct  2 19:15:25.146000 audit: BPF prog-id=15 op=UNLOAD
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit: BPF prog-id=45 op=LOAD
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:25.146000 audit: BPF prog-id=46 op=LOAD
Oct  2 19:15:25.146000 audit: BPF prog-id=16 op=UNLOAD
Oct  2 19:15:25.146000 audit: BPF prog-id=17 op=UNLOAD
Oct  2 19:15:25.159119 systemd[1]: Started kubelet.service.
Oct  2 19:15:25.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:25.230978 kubelet[1876]: E1002 19:15:25.230830    1876 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Oct  2 19:15:25.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 19:15:25.235614 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 19:15:25.235725 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 19:15:28.924385 env[1311]: time="2023-10-02T19:15:28.924322359Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\""
Oct  2 19:15:29.522279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2794933138.mount: Deactivated successfully.
Oct  2 19:15:31.561056 env[1311]: time="2023-10-02T19:15:31.561001707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:31.569326 env[1311]: time="2023-10-02T19:15:31.569197362Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:31.575057 env[1311]: time="2023-10-02T19:15:31.574014687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:31.582079 env[1311]: time="2023-10-02T19:15:31.582049831Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5f354253b464a8802ce01ffdd1bb8d0d17785daca4b6c8b84df06e9949e21449,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:31.582392 env[1311]: time="2023-10-02T19:15:31.582365652Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\" returns image reference \"sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2\""
Oct  2 19:15:31.593294 env[1311]: time="2023-10-02T19:15:31.593265489Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\""
Oct  2 19:15:33.532085 env[1311]: time="2023-10-02T19:15:33.532027848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:33.540049 env[1311]: time="2023-10-02T19:15:33.540002057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:33.544539 env[1311]: time="2023-10-02T19:15:33.544503645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:33.548734 env[1311]: time="2023-10-02T19:15:33.548703013Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:27bf12cdfcccc8893cd66e4573044ec46fb05964a02f67b3e1a59f66db7ee101,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:33.549401 env[1311]: time="2023-10-02T19:15:33.549369056Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\" returns image reference \"sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c\""
Oct  2 19:15:33.561003 env[1311]: time="2023-10-02T19:15:33.560973798Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\""
Oct  2 19:15:34.943106 env[1311]: time="2023-10-02T19:15:34.943049883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:34.950648 env[1311]: time="2023-10-02T19:15:34.950604053Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:34.955002 env[1311]: time="2023-10-02T19:15:34.954969024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:34.960208 env[1311]: time="2023-10-02T19:15:34.960173348Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:cf0312a97893a0ff42b2863cdb43243afc6397c77f2f2036a73708069e9af315,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:34.960814 env[1311]: time="2023-10-02T19:15:34.960781886Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\" returns image reference \"sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999\""
Oct  2 19:15:34.970772 env[1311]: time="2023-10-02T19:15:34.970734204Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\""
Oct  2 19:15:35.373208 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1.
Oct  2 19:15:35.388260 kernel: kauditd_printk_skb: 258 callbacks suppressed
Oct  2 19:15:35.390697 kernel: audit: type=1130 audit(1696274135.371:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:35.390761 kernel: audit: type=1131 audit(1696274135.371:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:35.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:35.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:35.373562 systemd[1]: Stopped kubelet.service.
Oct  2 19:15:35.375614 systemd[1]: Started kubelet.service.
Oct  2 19:15:35.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:35.415608 kernel: audit: type=1130 audit(1696274135.373:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:35.431923 kubelet[1911]: E1002 19:15:35.431880    1911 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Oct  2 19:15:35.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 19:15:35.435187 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 19:15:35.449598 kernel: audit: type=1131 audit(1696274135.433:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 19:15:35.435299 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 19:15:36.017719 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1938397338.mount: Deactivated successfully.
Oct  2 19:15:36.499738 env[1311]: time="2023-10-02T19:15:36.499682567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:36.507544 env[1311]: time="2023-10-02T19:15:36.507504727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:36.511245 env[1311]: time="2023-10-02T19:15:36.511208345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:36.514478 env[1311]: time="2023-10-02T19:15:36.514444835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d8c8e3e8fe630c3f2d84a22722d4891343196483ac4cc02c1ba9345b1bfc8a3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:36.514899 env[1311]: time="2023-10-02T19:15:36.514867760Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\" returns image reference \"sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad\""
Oct  2 19:15:36.525086 env[1311]: time="2023-10-02T19:15:36.525059459Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\""
Oct  2 19:15:36.988911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2921648312.mount: Deactivated successfully.
Oct  2 19:15:37.011026 env[1311]: time="2023-10-02T19:15:37.010982015Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:37.018773 env[1311]: time="2023-10-02T19:15:37.018732658Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:37.022721 env[1311]: time="2023-10-02T19:15:37.022689584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:37.027838 env[1311]: time="2023-10-02T19:15:37.027809077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:37.028266 env[1311]: time="2023-10-02T19:15:37.028236702Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\""
Oct  2 19:15:37.037800 env[1311]: time="2023-10-02T19:15:37.037773347Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\""
Oct  2 19:15:37.874123 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount240919566.mount: Deactivated successfully.
Oct  2 19:15:42.022286 env[1311]: time="2023-10-02T19:15:42.022228748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:42.030891 env[1311]: time="2023-10-02T19:15:42.030803175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:42.036697 env[1311]: time="2023-10-02T19:15:42.036658568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:42.041615 env[1311]: time="2023-10-02T19:15:42.041581113Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:42.043144 env[1311]: time="2023-10-02T19:15:42.043105289Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\""
Oct  2 19:15:42.057659 env[1311]: time="2023-10-02T19:15:42.057619714Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\""
Oct  2 19:15:42.592189 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2353984399.mount: Deactivated successfully.
Oct  2 19:15:43.190736 env[1311]: time="2023-10-02T19:15:43.190678506Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:43.201334 env[1311]: time="2023-10-02T19:15:43.201240619Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:43.210129 env[1311]: time="2023-10-02T19:15:43.210094549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:43.230813 env[1311]: time="2023-10-02T19:15:43.230761253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:43.231570 env[1311]: time="2023-10-02T19:15:43.231526090Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\""
Oct  2 19:15:45.419866 systemd[1]: Stopped kubelet.service.
Oct  2 19:15:45.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:45.452529 kernel: audit: type=1130 audit(1696274145.419:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:45.452654 kernel: audit: type=1131 audit(1696274145.419:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:45.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:45.441938 systemd[1]: Reloading.
Oct  2 19:15:45.522361 /usr/lib/systemd/system-generators/torcx-generator[2010]: time="2023-10-02T19:15:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:15:45.522396 /usr/lib/systemd/system-generators/torcx-generator[2010]: time="2023-10-02T19:15:45Z" level=info msg="torcx already run"
Oct  2 19:15:45.621824 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:15:45.621844 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:15:45.639801 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:15:45.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.719385 kernel: audit: type=1400 audit(1696274145.703:387): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.745302 kernel: audit: type=1400 audit(1696274145.703:388): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.745391 kernel: audit: type=1400 audit(1696274145.704:389): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.758680 kernel: audit: type=1400 audit(1696274145.704:390): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.774107 kernel: audit: type=1400 audit(1696274145.704:391): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.788116 kernel: audit: type=1400 audit(1696274145.704:392): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.788187 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 19:15:45.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.805638 kernel: audit: type=1400 audit(1696274145.704:393): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit: BPF prog-id=47 op=LOAD
Oct  2 19:15:45.717000 audit: BPF prog-id=32 op=UNLOAD
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.717000 audit: BPF prog-id=48 op=LOAD
Oct  2 19:15:45.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.719000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.719000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.731000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.731000 audit: BPF prog-id=49 op=LOAD
Oct  2 19:15:45.731000 audit: BPF prog-id=33 op=UNLOAD
Oct  2 19:15:45.731000 audit: BPF prog-id=34 op=UNLOAD
Oct  2 19:15:45.732000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.732000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.732000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.732000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.732000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.732000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.732000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.732000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.732000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit: BPF prog-id=50 op=LOAD
Oct  2 19:15:45.744000 audit: BPF prog-id=35 op=UNLOAD
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.757000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.757000 audit: BPF prog-id=51 op=LOAD
Oct  2 19:15:45.757000 audit: BPF prog-id=36 op=UNLOAD
Oct  2 19:15:45.758000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.758000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.758000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.758000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.758000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.758000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.758000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.758000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.758000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.773000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.773000 audit: BPF prog-id=52 op=LOAD
Oct  2 19:15:45.773000 audit: BPF prog-id=37 op=UNLOAD
Oct  2 19:15:45.776000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.804000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.804000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.805000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.805000 audit: BPF prog-id=53 op=LOAD
Oct  2 19:15:45.805000 audit: BPF prog-id=38 op=UNLOAD
Oct  2 19:15:45.805000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.805000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.805000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.805000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.805000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.805000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.805000 audit: BPF prog-id=40 op=UNLOAD
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.806000 audit: BPF prog-id=56 op=LOAD
Oct  2 19:15:45.806000 audit: BPF prog-id=41 op=UNLOAD
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit: BPF prog-id=57 op=LOAD
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.807000 audit: BPF prog-id=42 op=UNLOAD
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit: BPF prog-id=59 op=LOAD
Oct  2 19:15:45.809000 audit: BPF prog-id=44 op=UNLOAD
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit: BPF prog-id=60 op=LOAD
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:45.809000 audit: BPF prog-id=61 op=LOAD
Oct  2 19:15:45.809000 audit: BPF prog-id=45 op=UNLOAD
Oct  2 19:15:45.809000 audit: BPF prog-id=46 op=UNLOAD
Oct  2 19:15:45.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:45.827452 systemd[1]: Started kubelet.service.
Oct  2 19:15:45.880776 kubelet[2073]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Oct  2 19:15:45.881125 kubelet[2073]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:15:45.881269 kubelet[2073]: I1002 19:15:45.881241    2073 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Oct  2 19:15:45.882704 kubelet[2073]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Oct  2 19:15:45.882794 kubelet[2073]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:15:46.226923 kubelet[2073]: I1002 19:15:46.226886    2073 server.go:412] "Kubelet version" kubeletVersion="v1.26.5"
Oct  2 19:15:46.226923 kubelet[2073]: I1002 19:15:46.226912    2073 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Oct  2 19:15:46.227204 kubelet[2073]: I1002 19:15:46.227184    2073 server.go:836] "Client rotation is on, will bootstrap in background"
Oct  2 19:15:46.230167 kubelet[2073]: I1002 19:15:46.230146    2073 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 19:15:46.230498 kubelet[2073]: E1002 19:15:46.230482    2073 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.233620 kubelet[2073]: I1002 19:15:46.233587    2073 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Oct  2 19:15:46.233881 kubelet[2073]: I1002 19:15:46.233863    2073 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Oct  2 19:15:46.234004 kubelet[2073]: I1002 19:15:46.233989    2073 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Oct  2 19:15:46.234135 kubelet[2073]: I1002 19:15:46.234022    2073 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Oct  2 19:15:46.234135 kubelet[2073]: I1002 19:15:46.234046    2073 container_manager_linux.go:308] "Creating device plugin manager"
Oct  2 19:15:46.234227 kubelet[2073]: I1002 19:15:46.234144    2073 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:15:46.239738 kubelet[2073]: I1002 19:15:46.239719    2073 kubelet.go:398] "Attempting to sync node with API server"
Oct  2 19:15:46.239826 kubelet[2073]: I1002 19:15:46.239745    2073 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests"
Oct  2 19:15:46.239826 kubelet[2073]: I1002 19:15:46.239770    2073 kubelet.go:297] "Adding apiserver pod source"
Oct  2 19:15:46.239826 kubelet[2073]: I1002 19:15:46.239783    2073 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Oct  2 19:15:46.240882 kubelet[2073]: W1002 19:15:46.240839    2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.240987 kubelet[2073]: E1002 19:15:46.240901    2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.241046 kubelet[2073]: W1002 19:15:46.240994    2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-e4b0ec5c33&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.241046 kubelet[2073]: E1002 19:15:46.241034    2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-e4b0ec5c33&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.241135 kubelet[2073]: I1002 19:15:46.241129    2073 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Oct  2 19:15:46.241403 kubelet[2073]: W1002 19:15:46.241383    2073 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Oct  2 19:15:46.241835 kubelet[2073]: I1002 19:15:46.241812    2073 server.go:1186] "Started kubelet"
Oct  2 19:15:46.242000 audit[2073]: AVC avc:  denied  { mac_admin } for  pid=2073 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:46.242000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:15:46.242000 audit[2073]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e4dad0 a1=c000e30b70 a2=c000e4daa0 a3=25 items=0 ppid=1 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.242000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:15:46.242000 audit[2073]: AVC avc:  denied  { mac_admin } for  pid=2073 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:46.242000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:15:46.242000 audit[2073]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000209400 a1=c000e30b88 a2=c000e4db60 a3=25 items=0 ppid=1 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.242000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:15:46.243965 kubelet[2073]: I1002 19:15:46.243386    2073 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Oct  2 19:15:46.243965 kubelet[2073]: I1002 19:15:46.243441    2073 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Oct  2 19:15:46.243965 kubelet[2073]: I1002 19:15:46.243508    2073 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Oct  2 19:15:46.245000 audit[2086]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2086 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.245000 audit[2086]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdbb6110b0 a2=0 a3=7ffdbb61109c items=0 ppid=2073 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 19:15:46.246936 kubelet[2073]: I1002 19:15:46.246866    2073 server.go:161] "Starting to listen" address="0.0.0.0" port=10250
Oct  2 19:15:46.247439 kubelet[2073]: E1002 19:15:46.247320    2073 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a6059486b8865", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 241775717, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 241775717, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.8.37:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.37:6443: connect: connection refused'(may retry after sleeping)
Oct  2 19:15:46.247850 kubelet[2073]: E1002 19:15:46.247835    2073 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Oct  2 19:15:46.247990 kubelet[2073]: E1002 19:15:46.247978    2073 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Oct  2 19:15:46.248572 kubelet[2073]: I1002 19:15:46.248545    2073 server.go:451] "Adding debug handlers to kubelet server"
Oct  2 19:15:46.249455 kubelet[2073]: I1002 19:15:46.249432    2073 volume_manager.go:293] "Starting Kubelet Volume Manager"
Oct  2 19:15:46.249000 audit[2087]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.249000 audit[2087]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffca1ba290 a2=0 a3=7fffca1ba27c items=0 ppid=2073 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 19:15:46.251085 kubelet[2073]: I1002 19:15:46.251018    2073 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Oct  2 19:15:46.251410 kubelet[2073]: E1002 19:15:46.251373    2073 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.253246 kubelet[2073]: W1002 19:15:46.253211    2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.253368 kubelet[2073]: E1002 19:15:46.253358    2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.253000 audit[2089]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.253000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff73fee0b0 a2=0 a3=7fff73fee09c items=0 ppid=2073 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 19:15:46.256000 audit[2091]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.256000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd09ae36c0 a2=0 a3=7ffd09ae36ac items=0 ppid=2073 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 19:15:46.297626 kubelet[2073]: I1002 19:15:46.297607    2073 cpu_manager.go:214] "Starting CPU manager" policy="none"
Oct  2 19:15:46.297626 kubelet[2073]: I1002 19:15:46.297626    2073 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Oct  2 19:15:46.297781 kubelet[2073]: I1002 19:15:46.297643    2073 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:15:46.303600 kubelet[2073]: I1002 19:15:46.303573    2073 policy_none.go:49] "None policy: Start"
Oct  2 19:15:46.304134 kubelet[2073]: I1002 19:15:46.304115    2073 memory_manager.go:169] "Starting memorymanager" policy="None"
Oct  2 19:15:46.304134 kubelet[2073]: I1002 19:15:46.304141    2073 state_mem.go:35] "Initializing new in-memory state store"
Oct  2 19:15:46.307000 audit[2094]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.307000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc09749590 a2=0 a3=7ffc0974957c items=0 ppid=2073 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Oct  2 19:15:46.312000 audit[2096]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.312000 audit[2096]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc5e3ef70 a2=0 a3=7ffcc5e3ef5c items=0 ppid=2073 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Oct  2 19:15:46.312809 systemd[1]: Created slice kubepods.slice.
Oct  2 19:15:46.330723 systemd[1]: Created slice kubepods-burstable.slice.
Oct  2 19:15:46.334119 systemd[1]: Created slice kubepods-besteffort.slice.
Oct  2 19:15:46.340690 kubelet[2073]: I1002 19:15:46.340667    2073 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Oct  2 19:15:46.339000 audit[2073]: AVC avc:  denied  { mac_admin } for  pid=2073 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:46.339000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:15:46.339000 audit[2073]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000da5980 a1=c001069620 a2=c000da5950 a3=25 items=0 ppid=1 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.339000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:15:46.341062 kubelet[2073]: I1002 19:15:46.340766    2073 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Oct  2 19:15:46.341062 kubelet[2073]: I1002 19:15:46.341000    2073 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Oct  2 19:15:46.342741 kubelet[2073]: E1002 19:15:46.342589    2073 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-e4b0ec5c33\" not found"
Oct  2 19:15:46.351621 kubelet[2073]: I1002 19:15:46.351602    2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.351925 kubelet[2073]: E1002 19:15:46.351907    2073 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.374000 audit[2099]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.374000 audit[2099]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc6a510cb0 a2=0 a3=7ffc6a510c9c items=0 ppid=2073 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Oct  2 19:15:46.415000 audit[2102]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.415000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff950293e0 a2=0 a3=7fff950293cc items=0 ppid=2073 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Oct  2 19:15:46.417000 audit[2103]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.417000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe8e142190 a2=0 a3=7ffe8e14217c items=0 ppid=2073 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Oct  2 19:15:46.418000 audit[2104]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.418000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3cfdc150 a2=0 a3=7ffc3cfdc13c items=0 ppid=2073 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 19:15:46.421000 audit[2106]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.421000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe1593c100 a2=0 a3=7ffe1593c0ec items=0 ppid=2073 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Oct  2 19:15:46.424000 audit[2108]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.424000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff91abe8a0 a2=0 a3=7fff91abe88c items=0 ppid=2073 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 19:15:46.426000 audit[2110]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.426000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe040d7000 a2=0 a3=7ffe040d6fec items=0 ppid=2073 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Oct  2 19:15:46.428000 audit[2112]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.428000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd9eb1f330 a2=0 a3=7ffd9eb1f31c items=0 ppid=2073 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Oct  2 19:15:46.430000 audit[2114]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.430000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7fff386ed890 a2=0 a3=7fff386ed87c items=0 ppid=2073 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Oct  2 19:15:46.432131 kubelet[2073]: I1002 19:15:46.432110    2073 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Oct  2 19:15:46.432000 audit[2115]: NETFILTER_CFG table=mangle:45 family=10 entries=2 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.432000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff4f282740 a2=0 a3=7fff4f28272c items=0 ppid=2073 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 19:15:46.432000 audit[2116]: NETFILTER_CFG table=mangle:46 family=2 entries=1 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.432000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9be97630 a2=0 a3=7ffe9be9761c items=0 ppid=2073 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 19:15:46.433000 audit[2117]: NETFILTER_CFG table=nat:47 family=10 entries=2 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.433000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffebfa0ec60 a2=0 a3=7ffebfa0ec4c items=0 ppid=2073 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.433000 audit[2118]: NETFILTER_CFG table=nat:48 family=2 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.433000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd299ce00 a2=0 a3=7ffcd299cdec items=0 ppid=2073 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 19:15:46.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Oct  2 19:15:46.434000 audit[2119]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:15:46.434000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1315a5c0 a2=0 a3=7fff1315a5ac items=0 ppid=2073 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 19:15:46.436000 audit[2121]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_rule pid=2121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.436000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffce02864e0 a2=0 a3=7ffce02864cc items=0 ppid=2073 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Oct  2 19:15:46.437000 audit[2122]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.437000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffea3701f0 a2=0 a3=7fffea3701dc items=0 ppid=2073 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 19:15:46.439000 audit[2124]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.439000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff768b0e50 a2=0 a3=7fff768b0e3c items=0 ppid=2073 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Oct  2 19:15:46.440000 audit[2125]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.440000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd185edee0 a2=0 a3=7ffd185edecc items=0 ppid=2073 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Oct  2 19:15:46.441000 audit[2126]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.441000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd55d09530 a2=0 a3=7ffd55d0951c items=0 ppid=2073 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 19:15:46.443000 audit[2128]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.443000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc4e545600 a2=0 a3=7ffc4e5455ec items=0 ppid=2073 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Oct  2 19:15:46.445000 audit[2130]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.445000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffea3702140 a2=0 a3=7ffea370212c items=0 ppid=2073 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 19:15:46.447000 audit[2132]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.447000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd1fbcaa70 a2=0 a3=7ffd1fbcaa5c items=0 ppid=2073 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Oct  2 19:15:46.449000 audit[2134]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.449000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff77dae160 a2=0 a3=7fff77dae14c items=0 ppid=2073 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Oct  2 19:15:46.451862 kubelet[2073]: E1002 19:15:46.451828    2073 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.452000 audit[2136]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_rule pid=2136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.452000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd0ba863f0 a2=0 a3=7ffd0ba863dc items=0 ppid=2073 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Oct  2 19:15:46.454308 kubelet[2073]: I1002 19:15:46.454272    2073 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Oct  2 19:15:46.454395 kubelet[2073]: I1002 19:15:46.454319    2073 status_manager.go:176] "Starting to sync pod status with apiserver"
Oct  2 19:15:46.454395 kubelet[2073]: I1002 19:15:46.454342    2073 kubelet.go:2113] "Starting kubelet main sync loop"
Oct  2 19:15:46.454475 kubelet[2073]: E1002 19:15:46.454396    2073 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Oct  2 19:15:46.455465 kubelet[2073]: W1002 19:15:46.455353    2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.455605 kubelet[2073]: E1002 19:15:46.455590    2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.460000 audit[2137]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.460000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd75f46670 a2=0 a3=7ffd75f4665c items=0 ppid=2073 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 19:15:46.461000 audit[2138]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.461000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeb73f2c0 a2=0 a3=7ffeeb73f2ac items=0 ppid=2073 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 19:15:46.462000 audit[2139]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:15:46.462000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd81348e90 a2=0 a3=7ffd81348e7c items=0 ppid=2073 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:46.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 19:15:46.557991 kubelet[2073]: I1002 19:15:46.553987    2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.557991 kubelet[2073]: E1002 19:15:46.554364    2073 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.557991 kubelet[2073]: I1002 19:15:46.554464    2073 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:15:46.559844 kubelet[2073]: I1002 19:15:46.559824    2073 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:15:46.561178 kubelet[2073]: I1002 19:15:46.561159    2073 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:15:46.562214 kubelet[2073]: I1002 19:15:46.562190    2073 status_manager.go:698] "Failed to get status for pod" podUID=4f2db13905ed6eb6a2edcb5348452af6 pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused"
Oct  2 19:15:46.563108 kubelet[2073]: I1002 19:15:46.562800    2073 status_manager.go:698] "Failed to get status for pod" podUID=9d26e32db3a020d8b883070061674906 pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused"
Oct  2 19:15:46.564596 kubelet[2073]: I1002 19:15:46.564576    2073 status_manager.go:698] "Failed to get status for pod" podUID=0e9923d274f84de35f2a55d22e743214 pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused"
Oct  2 19:15:46.567550 systemd[1]: Created slice kubepods-burstable-pod4f2db13905ed6eb6a2edcb5348452af6.slice.
Oct  2 19:15:46.577244 systemd[1]: Created slice kubepods-burstable-pod9d26e32db3a020d8b883070061674906.slice.
Oct  2 19:15:46.585713 systemd[1]: Created slice kubepods-burstable-pod0e9923d274f84de35f2a55d22e743214.slice.
Oct  2 19:15:46.652838 kubelet[2073]: I1002 19:15:46.652798    2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.653066 kubelet[2073]: I1002 19:15:46.653044    2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.653186 kubelet[2073]: I1002 19:15:46.653168    2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.653186 kubelet[2073]: I1002 19:15:46.653255    2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.653186 kubelet[2073]: I1002 19:15:46.653413    2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.653853 kubelet[2073]: I1002 19:15:46.653508    2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.653853 kubelet[2073]: I1002 19:15:46.653662    2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9d26e32db3a020d8b883070061674906-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"9d26e32db3a020d8b883070061674906\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.653853 kubelet[2073]: I1002 19:15:46.653788    2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.654030 kubelet[2073]: I1002 19:15:46.653929    2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.852651 kubelet[2073]: E1002 19:15:46.852521    2073 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:46.876829 env[1311]: time="2023-10-02T19:15:46.876785096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33,Uid:4f2db13905ed6eb6a2edcb5348452af6,Namespace:kube-system,Attempt:0,}"
Oct  2 19:15:46.880369 env[1311]: time="2023-10-02T19:15:46.880329055Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-e4b0ec5c33,Uid:9d26e32db3a020d8b883070061674906,Namespace:kube-system,Attempt:0,}"
Oct  2 19:15:46.888846 env[1311]: time="2023-10-02T19:15:46.888804335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-e4b0ec5c33,Uid:0e9923d274f84de35f2a55d22e743214,Namespace:kube-system,Attempt:0,}"
Oct  2 19:15:46.956616 kubelet[2073]: I1002 19:15:46.956581    2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:46.957217 kubelet[2073]: E1002 19:15:46.957193    2073 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:47.254843 kubelet[2073]: W1002 19:15:47.254786    2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:47.254843 kubelet[2073]: E1002 19:15:47.254845    2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:47.305868 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1983845509.mount: Deactivated successfully.
Oct  2 19:15:47.336628 env[1311]: time="2023-10-02T19:15:47.336572730Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.341353 env[1311]: time="2023-10-02T19:15:47.341262735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.358990 env[1311]: time="2023-10-02T19:15:47.358867404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.367886 env[1311]: time="2023-10-02T19:15:47.367843996Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.371882 env[1311]: time="2023-10-02T19:15:47.371845571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.383012 env[1311]: time="2023-10-02T19:15:47.382967656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.386801 env[1311]: time="2023-10-02T19:15:47.386763222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.390121 kubelet[2073]: W1002 19:15:47.390072    2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:47.390220 kubelet[2073]: E1002 19:15:47.390133    2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:47.394914 env[1311]: time="2023-10-02T19:15:47.394877677Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.403511 env[1311]: time="2023-10-02T19:15:47.403478452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.407133 env[1311]: time="2023-10-02T19:15:47.407101411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.417648 env[1311]: time="2023-10-02T19:15:47.417614170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.425524 kubelet[2073]: W1002 19:15:47.425480    2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-e4b0ec5c33&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:47.425604 kubelet[2073]: E1002 19:15:47.425554    2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-e4b0ec5c33&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:47.432373 env[1311]: time="2023-10-02T19:15:47.432334613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:15:47.480616 env[1311]: time="2023-10-02T19:15:47.480546919Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:15:47.480784 env[1311]: time="2023-10-02T19:15:47.480621422Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:15:47.480784 env[1311]: time="2023-10-02T19:15:47.480659624Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:15:47.481038 env[1311]: time="2023-10-02T19:15:47.480932536Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703 pid=2148 runtime=io.containerd.runc.v2
Oct  2 19:15:47.502592 env[1311]: time="2023-10-02T19:15:47.502420974Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:15:47.502592 env[1311]: time="2023-10-02T19:15:47.502461976Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:15:47.502592 env[1311]: time="2023-10-02T19:15:47.502477877Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:15:47.502891 env[1311]: time="2023-10-02T19:15:47.502844093Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303 pid=2172 runtime=io.containerd.runc.v2
Oct  2 19:15:47.506387 systemd[1]: Started cri-containerd-7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703.scope.
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit: BPF prog-id=62 op=LOAD
Oct  2 19:15:47.524000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.524000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit: BPF prog-id=63 op=LOAD
Oct  2 19:15:47.525000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e49b0 items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit: BPF prog-id=64 op=LOAD
Oct  2 19:15:47.525000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e49f8 items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737
Oct  2 19:15:47.525000 audit: BPF prog-id=64 op=UNLOAD
Oct  2 19:15:47.525000 audit: BPF prog-id=63 op=UNLOAD
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { perfmon } for  pid=2158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit[2158]: AVC avc:  denied  { bpf } for  pid=2158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.525000 audit: BPF prog-id=65 op=LOAD
Oct  2 19:15:47.525000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e4e08 items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737
Oct  2 19:15:47.529053 kubelet[2073]: W1002 19:15:47.528993    2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:47.529119 kubelet[2073]: E1002 19:15:47.529068    2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:47.536994 env[1311]: time="2023-10-02T19:15:47.535766931Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:15:47.536994 env[1311]: time="2023-10-02T19:15:47.535847034Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:15:47.536994 env[1311]: time="2023-10-02T19:15:47.535874536Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:15:47.536994 env[1311]: time="2023-10-02T19:15:47.536042143Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73 pid=2205 runtime=io.containerd.runc.v2
Oct  2 19:15:47.542932 systemd[1]: Started cri-containerd-41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303.scope.
Oct  2 19:15:47.557208 systemd[1]: Started cri-containerd-d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73.scope.
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.580000 audit: BPF prog-id=66 op=LOAD
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit: BPF prog-id=67 op=LOAD
Oct  2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003c66f0 items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit: BPF prog-id=68 op=LOAD
Oct  2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003c6738 items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963
Oct  2 19:15:47.581000 audit: BPF prog-id=68 op=UNLOAD
Oct  2 19:15:47.581000 audit: BPF prog-id=67 op=UNLOAD
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { perfmon } for  pid=2216 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit[2216]: AVC avc:  denied  { bpf } for  pid=2216 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.581000 audit: BPF prog-id=69 op=LOAD
Oct  2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c6b48 items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.592000 audit: BPF prog-id=70 op=LOAD
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit: BPF prog-id=71 op=LOAD
Oct  2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ac770 items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit: BPF prog-id=72 op=LOAD
Oct  2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ac7b8 items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434
Oct  2 19:15:47.593000 audit: BPF prog-id=72 op=UNLOAD
Oct  2 19:15:47.593000 audit: BPF prog-id=71 op=UNLOAD
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.593000 audit: BPF prog-id=73 op=LOAD
Oct  2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003acbc8 items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434
Oct  2 19:15:47.598013 env[1311]: time="2023-10-02T19:15:47.597939847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33,Uid:4f2db13905ed6eb6a2edcb5348452af6,Namespace:kube-system,Attempt:0,} returns sandbox id \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\""
Oct  2 19:15:47.602623 env[1311]: time="2023-10-02T19:15:47.602589250Z" level=info msg="CreateContainer within sandbox \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}"
Oct  2 19:15:47.638364 env[1311]: time="2023-10-02T19:15:47.638322711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-e4b0ec5c33,Uid:9d26e32db3a020d8b883070061674906,Namespace:kube-system,Attempt:0,} returns sandbox id \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\""
Oct  2 19:15:47.640733 env[1311]: time="2023-10-02T19:15:47.640702915Z" level=info msg="CreateContainer within sandbox \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}"
Oct  2 19:15:47.650087 env[1311]: time="2023-10-02T19:15:47.650058623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-e4b0ec5c33,Uid:0e9923d274f84de35f2a55d22e743214,Namespace:kube-system,Attempt:0,} returns sandbox id \"d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73\""
Oct  2 19:15:47.652272 env[1311]: time="2023-10-02T19:15:47.651482186Z" level=info msg="CreateContainer within sandbox \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324\""
Oct  2 19:15:47.652272 env[1311]: time="2023-10-02T19:15:47.652135714Z" level=info msg="StartContainer for \"2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324\""
Oct  2 19:15:47.653372 kubelet[2073]: E1002 19:15:47.653341    2073 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:47.654030 env[1311]: time="2023-10-02T19:15:47.653989995Z" level=info msg="CreateContainer within sandbox \"d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}"
Oct  2 19:15:47.670423 systemd[1]: Started cri-containerd-2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324.scope.
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.689000 audit: BPF prog-id=74 op=LOAD
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit: BPF prog-id=75 op=LOAD
Oct  2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024f20 items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit: BPF prog-id=76 op=LOAD
Oct  2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024f68 items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433
Oct  2 19:15:47.690000 audit: BPF prog-id=76 op=UNLOAD
Oct  2 19:15:47.690000 audit: BPF prog-id=75 op=UNLOAD
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { perfmon } for  pid=2278 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit[2278]: AVC avc:  denied  { bpf } for  pid=2278 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:47.690000 audit: BPF prog-id=77 op=LOAD
Oct  2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025378 items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433
Oct  2 19:15:47.758983 kubelet[2073]: I1002 19:15:47.758951    2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:47.759337 kubelet[2073]: E1002 19:15:47.759309    2073 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:48.225718 env[1311]: time="2023-10-02T19:15:48.225666613Z" level=info msg="StartContainer for \"2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324\" returns successfully"
Oct  2 19:15:48.232131 env[1311]: time="2023-10-02T19:15:48.232083186Z" level=info msg="CreateContainer within sandbox \"d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"5eb4688744bfc7401cbeefb30ef7697a65bb0fecbfd443cdb56b6a9beb346ebe\""
Oct  2 19:15:48.232659 env[1311]: time="2023-10-02T19:15:48.232624609Z" level=info msg="StartContainer for \"5eb4688744bfc7401cbeefb30ef7697a65bb0fecbfd443cdb56b6a9beb346ebe\""
Oct  2 19:15:48.234569 env[1311]: time="2023-10-02T19:15:48.234533290Z" level=info msg="CreateContainer within sandbox \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966\""
Oct  2 19:15:48.235134 env[1311]: time="2023-10-02T19:15:48.235095914Z" level=info msg="StartContainer for \"92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966\""
Oct  2 19:15:48.258167 systemd[1]: Started cri-containerd-92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966.scope.
Oct  2 19:15:48.273646 systemd[1]: Started cri-containerd-5eb4688744bfc7401cbeefb30ef7697a65bb0fecbfd443cdb56b6a9beb346ebe.scope.
Oct  2 19:15:48.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.317000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.317000 audit: BPF prog-id=78 op=LOAD
Oct  2 19:15:48.319007 kubelet[2073]: E1002 19:15:48.318981    2073 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.37:6443: connect: connection refused
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit: BPF prog-id=79 op=LOAD
Oct  2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003dc090 items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit: BPF prog-id=80 op=LOAD
Oct  2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003dc0d8 items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736
Oct  2 19:15:48.318000 audit: BPF prog-id=80 op=UNLOAD
Oct  2 19:15:48.318000 audit: BPF prog-id=79 op=UNLOAD
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.318000 audit: BPF prog-id=81 op=LOAD
Oct  2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003dc4e8 items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736
Oct  2 19:15:48.342000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.342000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.342000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.342000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.342000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.342000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.342000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.342000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.342000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit: BPF prog-id=82 op=LOAD
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit: BPF prog-id=83 op=LOAD
Oct  2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000373720 items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit: BPF prog-id=84 op=LOAD
Oct  2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000373768 items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865
Oct  2 19:15:48.343000 audit: BPF prog-id=84 op=UNLOAD
Oct  2 19:15:48.343000 audit: BPF prog-id=83 op=UNLOAD
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { perfmon } for  pid=2319 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit[2319]: AVC avc:  denied  { bpf } for  pid=2319 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:48.343000 audit: BPF prog-id=85 op=LOAD
Oct  2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000373b78 items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865
Oct  2 19:15:48.364876 env[1311]: time="2023-10-02T19:15:48.364821734Z" level=info msg="StartContainer for \"5eb4688744bfc7401cbeefb30ef7697a65bb0fecbfd443cdb56b6a9beb346ebe\" returns successfully"
Oct  2 19:15:48.416877 env[1311]: time="2023-10-02T19:15:48.416827047Z" level=info msg="StartContainer for \"92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966\" returns successfully"
Oct  2 19:15:48.465481 kubelet[2073]: I1002 19:15:48.465444    2073 status_manager.go:698] "Failed to get status for pod" podUID=4f2db13905ed6eb6a2edcb5348452af6 pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused"
Oct  2 19:15:48.469283 kubelet[2073]: I1002 19:15:48.469251    2073 status_manager.go:698] "Failed to get status for pod" podUID=0e9923d274f84de35f2a55d22e743214 pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused"
Oct  2 19:15:48.474203 kubelet[2073]: I1002 19:15:48.474179    2073 status_manager.go:698] "Failed to get status for pod" podUID=9d26e32db3a020d8b883070061674906 pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused"
Oct  2 19:15:48.494000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:48.494000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001047560 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:15:48.494000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:15:48.499000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:48.499000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001087040 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:15:48.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:15:49.361959 kubelet[2073]: I1002 19:15:49.361912    2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:50.479956 kernel: kauditd_printk_skb: 672 callbacks suppressed
Oct  2 19:15:50.480092 kernel: audit: type=1400 audit(1696274150.456:682): avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.456000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.457000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.531960 kernel: audit: type=1400 audit(1696274150.457:683): avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.457000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c004418060 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:15:50.583326 kernel: audit: type=1300 audit(1696274150.457:683): arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c004418060 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:15:50.583459 kernel: audit: type=1327 audit(1696274150.457:683): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:15:50.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:15:50.479000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.479000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00445c300 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:15:50.628963 kernel: audit: type=1400 audit(1696274150.479:684): avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.629042 kernel: audit: type=1300 audit(1696274150.479:684): arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00445c300 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:15:50.629076 kernel: audit: type=1327 audit(1696274150.479:684): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:15:50.479000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:15:50.456000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00b7a4f60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:15:50.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:15:50.691051 kernel: audit: type=1300 audit(1696274150.456:682): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00b7a4f60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:15:50.691151 kernel: audit: type=1327 audit(1696274150.456:682): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:15:50.498000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.699524 kubelet[2073]: I1002 19:15:50.699503    2073 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:50.712521 kernel: audit: type=1400 audit(1696274150.498:685): avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.498000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c000e3b920 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:15:50.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:15:50.550000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.550000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c0012aaf80 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:15:50.550000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:15:50.550000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:50.550000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c00b7a5830 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:15:50.550000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:15:50.751693 kubelet[2073]: E1002 19:15:50.751516    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a6059486b8865", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 241775717, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 241775717, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:50.789097 kubelet[2073]: E1002 19:15:50.789066    2073 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: namespaces "kube-node-lease" not found
Oct  2 19:15:50.815465 kubelet[2073]: E1002 19:15:50.815319    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a605948c9fa0a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 247965194, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 247965194, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:50.870716 kubelet[2073]: E1002 19:15:50.870622    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb68757", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297022295, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297022295, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:50.925014 kubelet[2073]: E1002 19:15:50.924880    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb69cd3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297027795, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297027795, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:50.979559 kubelet[2073]: E1002 19:15:50.979461    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb6c69f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297038495, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297038495, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:51.033883 kubelet[2073]: E1002 19:15:51.033695    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594e6a8bb9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 342374329, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 342374329, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:51.089737 kubelet[2073]: E1002 19:15:51.089629    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb68757", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297022295, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 351563741, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:51.145145 kubelet[2073]: E1002 19:15:51.145035    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb69cd3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297027795, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 351572441, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:51.201369 kubelet[2073]: E1002 19:15:51.201262    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb6c69f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297038495, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 351577341, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:51.243906 kubelet[2073]: I1002 19:15:51.243859    2073 apiserver.go:52] "Watching apiserver"
Oct  2 19:15:51.251515 kubelet[2073]: I1002 19:15:51.251480    2073 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Oct  2 19:15:51.286121 kubelet[2073]: I1002 19:15:51.285865    2073 reconciler.go:41] "Reconciler: start to sync state"
Oct  2 19:15:51.406821 kubelet[2073]: E1002 19:15:51.406692    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb68757", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297022295, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 553930916, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:51.813140 kubelet[2073]: E1002 19:15:51.813005    2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb69cd3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297027795, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 553937917, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!)
Oct  2 19:15:53.446140 systemd[1]: Reloading.
Oct  2 19:15:53.579086 /usr/lib/systemd/system-generators/torcx-generator[2403]: time="2023-10-02T19:15:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:15:53.580217 /usr/lib/systemd/system-generators/torcx-generator[2403]: time="2023-10-02T19:15:53Z" level=info msg="torcx already run"
Oct  2 19:15:53.599000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:53.600000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:53.600000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008d8520 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:15:53.600000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:15:53.599000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008d83e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:15:53.599000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:15:53.601000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:53.601000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008d8660 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:15:53.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:15:53.603000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:15:53.603000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c222e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:15:53.603000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:15:53.710523 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:15:53.710543 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:15:53.733310 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.814000 audit: BPF prog-id=86 op=LOAD
Oct  2 19:15:53.814000 audit: BPF prog-id=47 op=UNLOAD
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit: BPF prog-id=87 op=LOAD
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.815000 audit: BPF prog-id=88 op=LOAD
Oct  2 19:15:53.815000 audit: BPF prog-id=48 op=UNLOAD
Oct  2 19:15:53.815000 audit: BPF prog-id=49 op=UNLOAD
Oct  2 19:15:53.816000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.816000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.816000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.816000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.816000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.816000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.816000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.816000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.816000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit: BPF prog-id=89 op=LOAD
Oct  2 19:15:53.817000 audit: BPF prog-id=50 op=UNLOAD
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.817000 audit: BPF prog-id=90 op=LOAD
Oct  2 19:15:53.817000 audit: BPF prog-id=51 op=UNLOAD
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.818000 audit: BPF prog-id=91 op=LOAD
Oct  2 19:15:53.818000 audit: BPF prog-id=52 op=UNLOAD
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.819000 audit: BPF prog-id=92 op=LOAD
Oct  2 19:15:53.819000 audit: BPF prog-id=82 op=UNLOAD
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.824000 audit: BPF prog-id=93 op=LOAD
Oct  2 19:15:53.824000 audit: BPF prog-id=53 op=UNLOAD
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit: BPF prog-id=94 op=LOAD
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.825000 audit: BPF prog-id=95 op=LOAD
Oct  2 19:15:53.825000 audit: BPF prog-id=54 op=UNLOAD
Oct  2 19:15:53.825000 audit: BPF prog-id=55 op=UNLOAD
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.826000 audit: BPF prog-id=96 op=LOAD
Oct  2 19:15:53.826000 audit: BPF prog-id=70 op=UNLOAD
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit: BPF prog-id=97 op=LOAD
Oct  2 19:15:53.827000 audit: BPF prog-id=56 op=UNLOAD
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit: BPF prog-id=98 op=LOAD
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.827000 audit: BPF prog-id=99 op=LOAD
Oct  2 19:15:53.827000 audit: BPF prog-id=57 op=UNLOAD
Oct  2 19:15:53.827000 audit: BPF prog-id=58 op=UNLOAD
Oct  2 19:15:53.828000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.828000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.828000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.828000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit: BPF prog-id=100 op=LOAD
Oct  2 19:15:53.829000 audit: BPF prog-id=66 op=UNLOAD
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.829000 audit: BPF prog-id=101 op=LOAD
Oct  2 19:15:53.829000 audit: BPF prog-id=74 op=UNLOAD
Oct  2 19:15:53.831000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.831000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.831000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.831000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.831000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.831000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.831000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.831000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.831000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit: BPF prog-id=102 op=LOAD
Oct  2 19:15:53.832000 audit: BPF prog-id=78 op=UNLOAD
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.832000 audit: BPF prog-id=103 op=LOAD
Oct  2 19:15:53.832000 audit: BPF prog-id=62 op=UNLOAD
Oct  2 19:15:53.833000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.833000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.833000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.833000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.833000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.833000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.833000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit: BPF prog-id=104 op=LOAD
Oct  2 19:15:53.834000 audit: BPF prog-id=59 op=UNLOAD
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit: BPF prog-id=105 op=LOAD
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:53.834000 audit: BPF prog-id=106 op=LOAD
Oct  2 19:15:53.834000 audit: BPF prog-id=60 op=UNLOAD
Oct  2 19:15:53.834000 audit: BPF prog-id=61 op=UNLOAD
Oct  2 19:15:53.852564 kubelet[2073]: I1002 19:15:53.852004    2073 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 19:15:53.852218 systemd[1]: Stopping kubelet.service...
Oct  2 19:15:53.874313 systemd[1]: kubelet.service: Deactivated successfully.
Oct  2 19:15:53.874645 systemd[1]: Stopped kubelet.service.
Oct  2 19:15:53.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:53.877302 systemd[1]: Started kubelet.service.
Oct  2 19:15:53.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:15:53.976359 kubelet[2467]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Oct  2 19:15:53.976710 kubelet[2467]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:15:53.976850 kubelet[2467]: I1002 19:15:53.976818    2467 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Oct  2 19:15:53.978137 kubelet[2467]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Oct  2 19:15:53.978213 kubelet[2467]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:15:53.981626 kubelet[2467]: I1002 19:15:53.981602    2467 server.go:412] "Kubelet version" kubeletVersion="v1.26.5"
Oct  2 19:15:53.981626 kubelet[2467]: I1002 19:15:53.981621    2467 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Oct  2 19:15:53.981854 kubelet[2467]: I1002 19:15:53.981834    2467 server.go:836] "Client rotation is on, will bootstrap in background"
Oct  2 19:15:53.983077 kubelet[2467]: I1002 19:15:53.983054    2467 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem".
Oct  2 19:15:53.985162 kubelet[2467]: I1002 19:15:53.985141    2467 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 19:15:53.987183 kubelet[2467]: I1002 19:15:53.987164    2467 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Oct  2 19:15:53.987406 kubelet[2467]: I1002 19:15:53.987389    2467 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Oct  2 19:15:53.987478 kubelet[2467]: I1002 19:15:53.987468    2467 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Oct  2 19:15:53.987655 kubelet[2467]: I1002 19:15:53.987497    2467 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Oct  2 19:15:53.987655 kubelet[2467]: I1002 19:15:53.987512    2467 container_manager_linux.go:308] "Creating device plugin manager"
Oct  2 19:15:53.987655 kubelet[2467]: I1002 19:15:53.987555    2467 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:15:53.990277 kubelet[2467]: I1002 19:15:53.990257    2467 kubelet.go:398] "Attempting to sync node with API server"
Oct  2 19:15:53.990439 kubelet[2467]: I1002 19:15:53.990422    2467 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests"
Oct  2 19:15:53.990507 kubelet[2467]: I1002 19:15:53.990458    2467 kubelet.go:297] "Adding apiserver pod source"
Oct  2 19:15:53.990507 kubelet[2467]: I1002 19:15:53.990478    2467 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Oct  2 19:15:54.004104 kubelet[2467]: I1002 19:15:54.004087    2467 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Oct  2 19:15:54.004670 kubelet[2467]: I1002 19:15:54.004654    2467 server.go:1186] "Started kubelet"
Oct  2 19:15:54.005000 audit[2467]: AVC avc:  denied  { mac_admin } for  pid=2467 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:54.005000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:15:54.005000 audit[2467]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005c24b0 a1=c000153ae8 a2=c0005c2480 a3=25 items=0 ppid=1 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:54.005000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:15:54.006984 kubelet[2467]: I1002 19:15:54.006970    2467 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Oct  2 19:15:54.006000 audit[2467]: AVC avc:  denied  { mac_admin } for  pid=2467 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:54.006000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:15:54.006000 audit[2467]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cdee40 a1=c000153b00 a2=c0005c2540 a3=25 items=0 ppid=1 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:54.006000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:15:54.007441 kubelet[2467]: I1002 19:15:54.007411    2467 apiserver.go:52] "Watching apiserver"
Oct  2 19:15:54.007526 kubelet[2467]: I1002 19:15:54.007515    2467 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Oct  2 19:15:54.007641 kubelet[2467]: I1002 19:15:54.007629    2467 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Oct  2 19:15:54.009061 kubelet[2467]: E1002 19:15:54.009047    2467 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Oct  2 19:15:54.009179 kubelet[2467]: E1002 19:15:54.009168    2467 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Oct  2 19:15:54.012749 kubelet[2467]: I1002 19:15:54.012719    2467 server.go:161] "Starting to listen" address="0.0.0.0" port=10250
Oct  2 19:15:54.014050 kubelet[2467]: I1002 19:15:54.014022    2467 server.go:451] "Adding debug handlers to kubelet server"
Oct  2 19:15:54.017132 kubelet[2467]: I1002 19:15:54.016635    2467 volume_manager.go:293] "Starting Kubelet Volume Manager"
Oct  2 19:15:54.017132 kubelet[2467]: I1002 19:15:54.016920    2467 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Oct  2 19:15:54.078635 kubelet[2467]: I1002 19:15:54.078603    2467 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Oct  2 19:15:54.095499 kubelet[2467]: I1002 19:15:54.095466    2467 cpu_manager.go:214] "Starting CPU manager" policy="none"
Oct  2 19:15:54.095499 kubelet[2467]: I1002 19:15:54.095493    2467 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Oct  2 19:15:54.095499 kubelet[2467]: I1002 19:15:54.095510    2467 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:15:54.095725 kubelet[2467]: I1002 19:15:54.095693    2467 state_mem.go:88] "Updated default CPUSet" cpuSet=""
Oct  2 19:15:54.095725 kubelet[2467]: I1002 19:15:54.095711    2467 state_mem.go:96] "Updated CPUSet assignments" assignments=map[]
Oct  2 19:15:54.095725 kubelet[2467]: I1002 19:15:54.095720    2467 policy_none.go:49] "None policy: Start"
Oct  2 19:15:54.096533 kubelet[2467]: I1002 19:15:54.096510    2467 memory_manager.go:169] "Starting memorymanager" policy="None"
Oct  2 19:15:54.096533 kubelet[2467]: I1002 19:15:54.096536    2467 state_mem.go:35] "Initializing new in-memory state store"
Oct  2 19:15:54.096710 kubelet[2467]: I1002 19:15:54.096692    2467 state_mem.go:75] "Updated machine memory state"
Oct  2 19:15:54.101243 kubelet[2467]: I1002 19:15:54.101218    2467 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Oct  2 19:15:54.100000 audit[2467]: AVC avc:  denied  { mac_admin } for  pid=2467 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:15:54.100000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:15:54.100000 audit[2467]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0014a51d0 a1=c00150e3d8 a2=c0014a51a0 a3=25 items=0 ppid=1 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:15:54.100000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:15:54.101616 kubelet[2467]: I1002 19:15:54.101286    2467 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Oct  2 19:15:54.101616 kubelet[2467]: I1002 19:15:54.101527    2467 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Oct  2 19:15:54.122000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7170 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0
Oct  2 19:15:54.122000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eda600 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:15:54.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:15:54.131818 kubelet[2467]: I1002 19:15:54.131544    2467 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Oct  2 19:15:54.131818 kubelet[2467]: I1002 19:15:54.131566    2467 status_manager.go:176] "Starting to sync pod status with apiserver"
Oct  2 19:15:54.131818 kubelet[2467]: I1002 19:15:54.131600    2467 kubelet.go:2113] "Starting kubelet main sync loop"
Oct  2 19:15:54.131818 kubelet[2467]: E1002 19:15:54.131672    2467 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Oct  2 19:15:54.132818 kubelet[2467]: I1002 19:15:54.132796    2467 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.147359 kubelet[2467]: I1002 19:15:54.147340    2467 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.147541 kubelet[2467]: I1002 19:15:54.147530    2467 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.231874 kubelet[2467]: I1002 19:15:54.231741    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:15:54.234003 kubelet[2467]: I1002 19:15:54.233970    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:15:54.234143 kubelet[2467]: I1002 19:15:54.234059    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:15:54.243901 kubelet[2467]: E1002 19:15:54.243874    2467 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.317999 kubelet[2467]: I1002 19:15:54.317933    2467 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Oct  2 19:15:54.319867 kubelet[2467]: I1002 19:15:54.319819    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9d26e32db3a020d8b883070061674906-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"9d26e32db3a020d8b883070061674906\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.320098 kubelet[2467]: I1002 19:15:54.320074    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.320187 kubelet[2467]: I1002 19:15:54.320153    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.320321 kubelet[2467]: I1002 19:15:54.320301    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.320405 kubelet[2467]: I1002 19:15:54.320381    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.320497 kubelet[2467]: I1002 19:15:54.320474    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.320595 kubelet[2467]: I1002 19:15:54.320580    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.320743 kubelet[2467]: I1002 19:15:54.320685    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.320861 kubelet[2467]: I1002 19:15:54.320841    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:15:54.320934 kubelet[2467]: I1002 19:15:54.320887    2467 reconciler.go:41] "Reconciler: start to sync state"
Oct  2 19:15:55.197956 kubelet[2467]: I1002 19:15:55.197916    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" podStartSLOduration=3.197849483 pod.CreationTimestamp="2023-10-02 19:15:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:15:54.80522814 +0000 UTC m=+0.920409981" watchObservedRunningTime="2023-10-02 19:15:55.197849483 +0000 UTC m=+1.313031224"
Oct  2 19:15:55.603578 kubelet[2467]: I1002 19:15:55.603480    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33" podStartSLOduration=1.603439609 pod.CreationTimestamp="2023-10-02 19:15:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:15:55.199384137 +0000 UTC m=+1.314565978" watchObservedRunningTime="2023-10-02 19:15:55.603439609 +0000 UTC m=+1.718621350"
Oct  2 19:15:55.603856 kubelet[2467]: I1002 19:15:55.603834    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" podStartSLOduration=1.603796922 pod.CreationTimestamp="2023-10-02 19:15:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:15:55.602882389 +0000 UTC m=+1.718064130" watchObservedRunningTime="2023-10-02 19:15:55.603796922 +0000 UTC m=+1.718978663"
Oct  2 19:16:01.519348 sudo[1671]: pam_unix(sudo:session): session closed for user root
Oct  2 19:16:01.518000 audit[1671]: USER_END pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:16:01.523988 kernel: kauditd_printk_skb: 281 callbacks suppressed
Oct  2 19:16:01.524085 kernel: audit: type=1106 audit(1696274161.518:942): pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:16:01.518000 audit[1671]: CRED_DISP pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:16:01.553840 kernel: audit: type=1104 audit(1696274161.518:943): pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:16:01.620069 sshd[1668]: pam_unix(sshd:session): session closed for user core
Oct  2 19:16:01.620000 audit[1668]: USER_END pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:16:01.623803 systemd[1]: sshd@6-10.200.8.37:22-10.200.12.6:36422.service: Deactivated successfully.
Oct  2 19:16:01.624739 systemd[1]: session-9.scope: Deactivated successfully.
Oct  2 19:16:01.624925 systemd[1]: session-9.scope: Consumed 3.285s CPU time.
Oct  2 19:16:01.626885 systemd-logind[1290]: Session 9 logged out. Waiting for processes to exit.
Oct  2 19:16:01.628173 systemd-logind[1290]: Removed session 9.
Oct  2 19:16:01.621000 audit[1668]: CRED_DISP pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:16:01.656559 kernel: audit: type=1106 audit(1696274161.620:944): pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:16:01.656640 kernel: audit: type=1104 audit(1696274161.621:945): pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:16:01.656663 kernel: audit: type=1131 audit(1696274161.623:946): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.37:22-10.200.12.6:36422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:16:01.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.37:22-10.200.12.6:36422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:16:06.502156 kubelet[2467]: I1002 19:16:06.502123    2467 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24"
Oct  2 19:16:06.502963 env[1311]: time="2023-10-02T19:16:06.502901677Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Oct  2 19:16:06.503466 kubelet[2467]: I1002 19:16:06.503440    2467 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24"
Oct  2 19:16:07.248133 kubelet[2467]: I1002 19:16:07.248093    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:07.255373 systemd[1]: Created slice kubepods-besteffort-pod6b32c327_783b_4d23_b98c_f638a336313e.slice.
Oct  2 19:16:07.401824 kubelet[2467]: I1002 19:16:07.401777    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6b32c327-783b-4d23-b98c-f638a336313e-lib-modules\") pod \"kube-proxy-vxvdt\" (UID: \"6b32c327-783b-4d23-b98c-f638a336313e\") " pod="kube-system/kube-proxy-vxvdt"
Oct  2 19:16:07.402038 kubelet[2467]: I1002 19:16:07.401832    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6b32c327-783b-4d23-b98c-f638a336313e-kube-proxy\") pod \"kube-proxy-vxvdt\" (UID: \"6b32c327-783b-4d23-b98c-f638a336313e\") " pod="kube-system/kube-proxy-vxvdt"
Oct  2 19:16:07.402038 kubelet[2467]: I1002 19:16:07.401875    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6b32c327-783b-4d23-b98c-f638a336313e-xtables-lock\") pod \"kube-proxy-vxvdt\" (UID: \"6b32c327-783b-4d23-b98c-f638a336313e\") " pod="kube-system/kube-proxy-vxvdt"
Oct  2 19:16:07.402038 kubelet[2467]: I1002 19:16:07.401900    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rf4h6\" (UniqueName: \"kubernetes.io/projected/6b32c327-783b-4d23-b98c-f638a336313e-kube-api-access-rf4h6\") pod \"kube-proxy-vxvdt\" (UID: \"6b32c327-783b-4d23-b98c-f638a336313e\") " pod="kube-system/kube-proxy-vxvdt"
Oct  2 19:16:07.459092 kubelet[2467]: I1002 19:16:07.459045    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:07.464831 systemd[1]: Created slice kubepods-besteffort-pod42aa5e79_06b0_4033_8d76_9173de3bf5ef.slice.
Oct  2 19:16:07.567715 env[1311]: time="2023-10-02T19:16:07.567573892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vxvdt,Uid:6b32c327-783b-4d23-b98c-f638a336313e,Namespace:kube-system,Attempt:0,}"
Oct  2 19:16:07.601186 env[1311]: time="2023-10-02T19:16:07.601118187Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:07.601186 env[1311]: time="2023-10-02T19:16:07.601155688Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:07.601415 env[1311]: time="2023-10-02T19:16:07.601381394Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:07.601717 env[1311]: time="2023-10-02T19:16:07.601647701Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace pid=2572 runtime=io.containerd.runc.v2
Oct  2 19:16:07.608620 kubelet[2467]: I1002 19:16:07.608467    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/42aa5e79-06b0-4033-8d76-9173de3bf5ef-var-lib-calico\") pod \"tigera-operator-54b47459dd-q86c9\" (UID: \"42aa5e79-06b0-4033-8d76-9173de3bf5ef\") " pod="tigera-operator/tigera-operator-54b47459dd-q86c9"
Oct  2 19:16:07.608620 kubelet[2467]: I1002 19:16:07.608518    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6trtb\" (UniqueName: \"kubernetes.io/projected/42aa5e79-06b0-4033-8d76-9173de3bf5ef-kube-api-access-6trtb\") pod \"tigera-operator-54b47459dd-q86c9\" (UID: \"42aa5e79-06b0-4033-8d76-9173de3bf5ef\") " pod="tigera-operator/tigera-operator-54b47459dd-q86c9"
Oct  2 19:16:07.624431 systemd[1]: run-containerd-runc-k8s.io-3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace-runc.5oqI6N.mount: Deactivated successfully.
Oct  2 19:16:07.626818 systemd[1]: Started cri-containerd-3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace.scope.
Oct  2 19:16:07.639000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.639000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.667623 kernel: audit: type=1400 audit(1696274167.639:947): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.667727 kernel: audit: type=1400 audit(1696274167.639:948): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.667758 kernel: audit: type=1400 audit(1696274167.639:949): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.639000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.694635 kernel: audit: type=1400 audit(1696274167.639:950): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.694712 kernel: audit: type=1400 audit(1696274167.639:951): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.722266 kernel: audit: type=1400 audit(1696274167.639:952): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.735763 kernel: audit: type=1400 audit(1696274167.639:953): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.736549 kernel: audit: type=1400 audit(1696274167.639:954): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.639000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.767967 kernel: audit: type=1400 audit(1696274167.639:955): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.768064 kernel: audit: type=1400 audit(1696274167.679:956): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.679000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.781695 env[1311]: time="2023-10-02T19:16:07.781654304Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-q86c9,Uid:42aa5e79-06b0-4033-8d76-9173de3bf5ef,Namespace:tigera-operator,Attempt:0,}"
Oct  2 19:16:07.784289 env[1311]: time="2023-10-02T19:16:07.783471652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vxvdt,Uid:6b32c327-783b-4d23-b98c-f638a336313e,Namespace:kube-system,Attempt:0,} returns sandbox id \"3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace\""
Oct  2 19:16:07.679000 audit: BPF prog-id=107 op=LOAD
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.786871 env[1311]: time="2023-10-02T19:16:07.786788241Z" level=info msg="CreateContainer within sandbox \"3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.680000 audit: BPF prog-id=108 op=LOAD
Oct  2 19:16:07.680000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024370 items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit: BPF prog-id=109 op=LOAD
Oct  2 19:16:07.707000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000243b8 items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639
Oct  2 19:16:07.707000 audit: BPF prog-id=109 op=UNLOAD
Oct  2 19:16:07.707000 audit: BPF prog-id=108 op=UNLOAD
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { perfmon } for  pid=2582 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit[2582]: AVC avc:  denied  { bpf } for  pid=2582 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.707000 audit: BPF prog-id=110 op=LOAD
Oct  2 19:16:07.707000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000247c8 items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639
Oct  2 19:16:07.830002 env[1311]: time="2023-10-02T19:16:07.828645157Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:07.830002 env[1311]: time="2023-10-02T19:16:07.828683458Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:07.830002 env[1311]: time="2023-10-02T19:16:07.828697559Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:07.830002 env[1311]: time="2023-10-02T19:16:07.828839563Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a pid=2615 runtime=io.containerd.runc.v2
Oct  2 19:16:07.836918 env[1311]: time="2023-10-02T19:16:07.836870177Z" level=info msg="CreateContainer within sandbox \"3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bd7e3bdd9aba0fea9ddb30898bd706bc9eccc2a1fc1d64939cdb68fdf00d0899\""
Oct  2 19:16:07.839050 env[1311]: time="2023-10-02T19:16:07.839015834Z" level=info msg="StartContainer for \"bd7e3bdd9aba0fea9ddb30898bd706bc9eccc2a1fc1d64939cdb68fdf00d0899\""
Oct  2 19:16:07.852558 systemd[1]: Started cri-containerd-47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a.scope.
Oct  2 19:16:07.877405 systemd[1]: Started cri-containerd-bd7e3bdd9aba0fea9ddb30898bd706bc9eccc2a1fc1d64939cdb68fdf00d0899.scope.
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.880000 audit: BPF prog-id=111 op=LOAD
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit: BPF prog-id=112 op=LOAD
Oct  2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fd460 items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit: BPF prog-id=113 op=LOAD
Oct  2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002fd4a8 items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133
Oct  2 19:16:07.882000 audit: BPF prog-id=113 op=UNLOAD
Oct  2 19:16:07.882000 audit: BPF prog-id=112 op=UNLOAD
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.882000 audit: BPF prog-id=114 op=LOAD
Oct  2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002fd8b8 items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2572 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376533626464396162613066656139646462333038393862643730
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit: BPF prog-id=115 op=LOAD
Oct  2 19:16:07.909000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0940 items=0 ppid=2572 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376533626464396162613066656139646462333038393862643730
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.909000 audit: BPF prog-id=116 op=LOAD
Oct  2 19:16:07.909000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0988 items=0 ppid=2572 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376533626464396162613066656139646462333038393862643730
Oct  2 19:16:07.910000 audit: BPF prog-id=116 op=UNLOAD
Oct  2 19:16:07.910000 audit: BPF prog-id=115 op=UNLOAD
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:07.910000 audit: BPF prog-id=117 op=LOAD
Oct  2 19:16:07.910000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0a18 items=0 ppid=2572 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376533626464396162613066656139646462333038393862643730
Oct  2 19:16:07.926051 env[1311]: time="2023-10-02T19:16:07.926000455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-q86c9,Uid:42aa5e79-06b0-4033-8d76-9173de3bf5ef,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\""
Oct  2 19:16:07.930024 env[1311]: time="2023-10-02T19:16:07.929984661Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\""
Oct  2 19:16:07.949419 env[1311]: time="2023-10-02T19:16:07.949388679Z" level=info msg="StartContainer for \"bd7e3bdd9aba0fea9ddb30898bd706bc9eccc2a1fc1d64939cdb68fdf00d0899\" returns successfully"
Oct  2 19:16:07.989000 audit[2702]: NETFILTER_CFG table=mangle:63 family=2 entries=1 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:07.989000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc13ef7e70 a2=0 a3=7ffc13ef7e5c items=0 ppid=2658 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 19:16:07.999000 audit[2704]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:07.999000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4c690bb0 a2=0 a3=7fff4c690b9c items=0 ppid=2658 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:07.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 19:16:08.000000 audit[2703]: NETFILTER_CFG table=mangle:65 family=10 entries=1 op=nft_register_chain pid=2703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.000000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7f6cacf0 a2=0 a3=7ffc7f6cacdc items=0 ppid=2658 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 19:16:08.002000 audit[2706]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.002000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd98a17b20 a2=0 a3=7ffd98a17b0c items=0 ppid=2658 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 19:16:08.002000 audit[2707]: NETFILTER_CFG table=nat:67 family=10 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.002000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddc98ec60 a2=0 a3=7ffddc98ec4c items=0 ppid=2658 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 19:16:08.003000 audit[2708]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.003000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd13d71c40 a2=0 a3=7ffd13d71c2c items=0 ppid=2658 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 19:16:08.093000 audit[2709]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.093000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffef73ffbb0 a2=0 a3=7ffef73ffb9c items=0 ppid=2658 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 19:16:08.098000 audit[2711]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_rule pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.098000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd3068f850 a2=0 a3=7ffd3068f83c items=0 ppid=2658 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Oct  2 19:16:08.102000 audit[2714]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.102000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc9aee77d0 a2=0 a3=7ffc9aee77bc items=0 ppid=2658 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Oct  2 19:16:08.103000 audit[2715]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_chain pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.103000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaf832480 a2=0 a3=7fffaf83246c items=0 ppid=2658 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 19:16:08.106000 audit[2717]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_rule pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.106000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc7990ef0 a2=0 a3=7ffcc7990edc items=0 ppid=2658 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 19:16:08.107000 audit[2718]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.107000 audit[2718]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe19f7ad30 a2=0 a3=7ffe19f7ad1c items=0 ppid=2658 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 19:16:08.109000 audit[2720]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.109000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe38aeb310 a2=0 a3=7ffe38aeb2fc items=0 ppid=2658 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 19:16:08.113000 audit[2723]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.113000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe416cda60 a2=0 a3=7ffe416cda4c items=0 ppid=2658 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Oct  2 19:16:08.114000 audit[2724]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.114000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7d688ec0 a2=0 a3=7ffc7d688eac items=0 ppid=2658 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 19:16:08.117000 audit[2726]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.117000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd60074590 a2=0 a3=7ffd6007457c items=0 ppid=2658 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 19:16:08.118000 audit[2727]: NETFILTER_CFG table=filter:79 family=2 entries=1 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.118000 audit[2727]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe243e54c0 a2=0 a3=7ffe243e54ac items=0 ppid=2658 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 19:16:08.121000 audit[2729]: NETFILTER_CFG table=filter:80 family=2 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.121000 audit[2729]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7db471f0 a2=0 a3=7ffe7db471dc items=0 ppid=2658 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 19:16:08.125000 audit[2732]: NETFILTER_CFG table=filter:81 family=2 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.125000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe354be470 a2=0 a3=7ffe354be45c items=0 ppid=2658 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 19:16:08.128000 audit[2735]: NETFILTER_CFG table=filter:82 family=2 entries=1 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.128000 audit[2735]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa24f2660 a2=0 a3=7fffa24f264c items=0 ppid=2658 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 19:16:08.129000 audit[2736]: NETFILTER_CFG table=nat:83 family=2 entries=1 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.129000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc7675ecd0 a2=0 a3=7ffc7675ecbc items=0 ppid=2658 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 19:16:08.134000 audit[2738]: NETFILTER_CFG table=nat:84 family=2 entries=1 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.134000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd611e3a90 a2=0 a3=7ffd611e3a7c items=0 ppid=2658 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:16:08.137000 audit[2741]: NETFILTER_CFG table=nat:85 family=2 entries=1 op=nft_register_rule pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:16:08.137000 audit[2741]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbd5d9110 a2=0 a3=7ffcbd5d90fc items=0 ppid=2658 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:16:08.170203 kubelet[2467]: I1002 19:16:08.170156    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-vxvdt" podStartSLOduration=1.170112667 pod.CreationTimestamp="2023-10-02 19:16:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:08.169768058 +0000 UTC m=+14.284949799" watchObservedRunningTime="2023-10-02 19:16:08.170112667 +0000 UTC m=+14.285294408"
Oct  2 19:16:08.258000 audit[2745]: NETFILTER_CFG table=filter:86 family=2 entries=6 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:08.258000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd3fed2530 a2=0 a3=7ffd3fed251c items=0 ppid=2658 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:08.314000 audit[2745]: NETFILTER_CFG table=nat:87 family=2 entries=17 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:08.314000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd3fed2530 a2=0 a3=7ffd3fed251c items=0 ppid=2658 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:08.315000 audit[2749]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.315000 audit[2749]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff458fb7e0 a2=0 a3=7fff458fb7cc items=0 ppid=2658 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 19:16:08.318000 audit[2751]: NETFILTER_CFG table=filter:89 family=10 entries=2 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.318000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffbc864010 a2=0 a3=7fffbc863ffc items=0 ppid=2658 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Oct  2 19:16:08.322000 audit[2754]: NETFILTER_CFG table=filter:90 family=10 entries=2 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.322000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd3608fe10 a2=0 a3=7ffd3608fdfc items=0 ppid=2658 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Oct  2 19:16:08.323000 audit[2755]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.323000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff289a5010 a2=0 a3=7fff289a4ffc items=0 ppid=2658 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 19:16:08.325000 audit[2757]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.325000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5ff2ff70 a2=0 a3=7ffd5ff2ff5c items=0 ppid=2658 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 19:16:08.327000 audit[2758]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.327000 audit[2758]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd26f082d0 a2=0 a3=7ffd26f082bc items=0 ppid=2658 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 19:16:08.329000 audit[2760]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.329000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe16009940 a2=0 a3=7ffe1600992c items=0 ppid=2658 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Oct  2 19:16:08.333000 audit[2763]: NETFILTER_CFG table=filter:95 family=10 entries=2 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.333000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffd502aae0 a2=0 a3=7fffd502aacc items=0 ppid=2658 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 19:16:08.334000 audit[2764]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.334000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda6be3640 a2=0 a3=7ffda6be362c items=0 ppid=2658 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 19:16:08.336000 audit[2766]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.336000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0bd22920 a2=0 a3=7fff0bd2290c items=0 ppid=2658 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 19:16:08.337000 audit[2767]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.337000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9de03500 a2=0 a3=7ffd9de034ec items=0 ppid=2658 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 19:16:08.340000 audit[2769]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.340000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc82182740 a2=0 a3=7ffc8218272c items=0 ppid=2658 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 19:16:08.344000 audit[2772]: NETFILTER_CFG table=filter:100 family=10 entries=1 op=nft_register_rule pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.344000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcac7f670 a2=0 a3=7fffcac7f65c items=0 ppid=2658 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 19:16:08.349000 audit[2775]: NETFILTER_CFG table=filter:101 family=10 entries=1 op=nft_register_rule pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.349000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1be31490 a2=0 a3=7fff1be3147c items=0 ppid=2658 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Oct  2 19:16:08.350000 audit[2776]: NETFILTER_CFG table=nat:102 family=10 entries=1 op=nft_register_chain pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.350000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff42f81330 a2=0 a3=7fff42f8131c items=0 ppid=2658 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 19:16:08.353000 audit[2778]: NETFILTER_CFG table=nat:103 family=10 entries=2 op=nft_register_chain pid=2778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.353000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd5344eb20 a2=0 a3=7ffd5344eb0c items=0 ppid=2658 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:16:08.358000 audit[2781]: NETFILTER_CFG table=nat:104 family=10 entries=2 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:16:08.358000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcb737d060 a2=0 a3=7ffcb737d04c items=0 ppid=2658 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:16:08.363000 audit[2785]: NETFILTER_CFG table=filter:105 family=10 entries=3 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 19:16:08.363000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffed13831c0 a2=0 a3=7ffed13831ac items=0 ppid=2658 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.363000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:08.363000 audit[2785]: NETFILTER_CFG table=nat:106 family=10 entries=10 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 19:16:08.363000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffed13831c0 a2=0 a3=7ffed13831ac items=0 ppid=2658 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:08.363000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:09.308966 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1838315639.mount: Deactivated successfully.
Oct  2 19:16:10.576662 env[1311]: time="2023-10-02T19:16:10.576607197Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:10.584205 env[1311]: time="2023-10-02T19:16:10.584147485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:10.588271 env[1311]: time="2023-10-02T19:16:10.588230587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:10.593034 env[1311]: time="2023-10-02T19:16:10.592997806Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:10.593748 env[1311]: time="2023-10-02T19:16:10.593709923Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\""
Oct  2 19:16:10.597407 env[1311]: time="2023-10-02T19:16:10.597360714Z" level=info msg="CreateContainer within sandbox \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}"
Oct  2 19:16:10.626907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4042724631.mount: Deactivated successfully.
Oct  2 19:16:10.633810 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1783706915.mount: Deactivated successfully.
Oct  2 19:16:10.649617 env[1311]: time="2023-10-02T19:16:10.649563816Z" level=info msg="CreateContainer within sandbox \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d\""
Oct  2 19:16:10.651922 env[1311]: time="2023-10-02T19:16:10.650311535Z" level=info msg="StartContainer for \"aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d\""
Oct  2 19:16:10.670822 systemd[1]: Started cri-containerd-aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d.scope.
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.684000 audit: BPF prog-id=118 op=LOAD
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit: BPF prog-id=119 op=LOAD
Oct  2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c4b90 items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit: BPF prog-id=120 op=LOAD
Oct  2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c4bd8 items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535
Oct  2 19:16:10.685000 audit: BPF prog-id=120 op=UNLOAD
Oct  2 19:16:10.685000 audit: BPF prog-id=119 op=UNLOAD
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { perfmon } for  pid=2793 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit[2793]: AVC avc:  denied  { bpf } for  pid=2793 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:10.685000 audit: BPF prog-id=121 op=LOAD
Oct  2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c4fe8 items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535
Oct  2 19:16:10.708982 env[1311]: time="2023-10-02T19:16:10.706500636Z" level=info msg="StartContainer for \"aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d\" returns successfully"
Oct  2 19:16:12.682000 audit[2848]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:12.687971 kernel: kauditd_printk_skb: 336 callbacks suppressed
Oct  2 19:16:12.688073 kernel: audit: type=1325 audit(1696274172.682:1051): table=filter:107 family=2 entries=13 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:12.682000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe097db640 a2=0 a3=7ffe097db62c items=0 ppid=2658 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:12.722853 kernel: audit: type=1300 audit(1696274172.682:1051): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe097db640 a2=0 a3=7ffe097db62c items=0 ppid=2658 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:12.723019 kernel: audit: type=1327 audit(1696274172.682:1051): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:12.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:12.682000 audit[2848]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:12.745836 kernel: audit: type=1325 audit(1696274172.682:1052): table=nat:108 family=2 entries=20 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:12.682000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe097db640 a2=0 a3=7ffe097db62c items=0 ppid=2658 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:12.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:12.776836 kernel: audit: type=1300 audit(1696274172.682:1052): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe097db640 a2=0 a3=7ffe097db62c items=0 ppid=2658 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:12.776936 kernel: audit: type=1327 audit(1696274172.682:1052): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:12.776978 kernel: audit: type=1325 audit(1696274172.740:1053): table=filter:109 family=2 entries=14 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:12.740000 audit[2874]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:12.740000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe348e1420 a2=0 a3=7ffe348e140c items=0 ppid=2658 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:12.806202 kernel: audit: type=1300 audit(1696274172.740:1053): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe348e1420 a2=0 a3=7ffe348e140c items=0 ppid=2658 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:12.806293 kernel: audit: type=1327 audit(1696274172.740:1053): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:12.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:12.759000 audit[2874]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:12.759000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe348e1420 a2=0 a3=7ffe348e140c items=0 ppid=2658 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:12.759000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:12.828965 kernel: audit: type=1325 audit(1696274172.759:1054): table=nat:110 family=2 entries=20 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:12.870526 kubelet[2467]: I1002 19:16:12.870482    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-54b47459dd-q86c9" podStartSLOduration=-9.223372030984352e+09 pod.CreationTimestamp="2023-10-02 19:16:07 +0000 UTC" firstStartedPulling="2023-10-02 19:16:07.92957425 +0000 UTC m=+14.044755991" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:11.175204231 +0000 UTC m=+17.290385972" watchObservedRunningTime="2023-10-02 19:16:12.870423428 +0000 UTC m=+18.985605169"
Oct  2 19:16:12.871041 kubelet[2467]: I1002 19:16:12.870733    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:12.876560 systemd[1]: Created slice kubepods-besteffort-pod688b660c_59dc_4b13_a0e0_1700293ef24f.slice.
Oct  2 19:16:12.959343 kubelet[2467]: I1002 19:16:12.959213    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:12.962574 kubelet[2467]: I1002 19:16:12.962551    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/688b660c-59dc-4b13-a0e0-1700293ef24f-tigera-ca-bundle\") pod \"calico-typha-5947df9844-mzrgg\" (UID: \"688b660c-59dc-4b13-a0e0-1700293ef24f\") " pod="calico-system/calico-typha-5947df9844-mzrgg"
Oct  2 19:16:12.962763 kubelet[2467]: I1002 19:16:12.962750    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/688b660c-59dc-4b13-a0e0-1700293ef24f-typha-certs\") pod \"calico-typha-5947df9844-mzrgg\" (UID: \"688b660c-59dc-4b13-a0e0-1700293ef24f\") " pod="calico-system/calico-typha-5947df9844-mzrgg"
Oct  2 19:16:12.962910 kubelet[2467]: I1002 19:16:12.962899    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ckc8g\" (UniqueName: \"kubernetes.io/projected/688b660c-59dc-4b13-a0e0-1700293ef24f-kube-api-access-ckc8g\") pod \"calico-typha-5947df9844-mzrgg\" (UID: \"688b660c-59dc-4b13-a0e0-1700293ef24f\") " pod="calico-system/calico-typha-5947df9844-mzrgg"
Oct  2 19:16:12.967755 systemd[1]: Created slice kubepods-besteffort-podd2341403_c352_4000_92fb_682620162c02.slice.
Oct  2 19:16:13.063612 kubelet[2467]: I1002 19:16:13.063571    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-policysync\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.063893 kubelet[2467]: I1002 19:16:13.063880    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-lib-modules\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.064066 kubelet[2467]: I1002 19:16:13.064053    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d2341403-c352-4000-92fb-682620162c02-tigera-ca-bundle\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.064188 kubelet[2467]: I1002 19:16:13.064178    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-cni-net-dir\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.064296 kubelet[2467]: I1002 19:16:13.064287    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-var-run-calico\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.064410 kubelet[2467]: I1002 19:16:13.064401    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-flexvol-driver-host\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.064510 kubelet[2467]: I1002 19:16:13.064500    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-97qq8\" (UniqueName: \"kubernetes.io/projected/d2341403-c352-4000-92fb-682620162c02-kube-api-access-97qq8\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.064654 kubelet[2467]: I1002 19:16:13.064640    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d2341403-c352-4000-92fb-682620162c02-node-certs\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.064787 kubelet[2467]: I1002 19:16:13.064774    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-var-lib-calico\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.064911 kubelet[2467]: I1002 19:16:13.064900    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-cni-log-dir\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.065057 kubelet[2467]: I1002 19:16:13.065044    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-xtables-lock\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.065181 kubelet[2467]: I1002 19:16:13.065169    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-cni-bin-dir\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d"
Oct  2 19:16:13.167888 kubelet[2467]: E1002 19:16:13.167857    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.167888 kubelet[2467]: W1002 19:16:13.167881    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.168147 kubelet[2467]: E1002 19:16:13.167908    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.168147 kubelet[2467]: E1002 19:16:13.168116    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.168147 kubelet[2467]: W1002 19:16:13.168126    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.168147 kubelet[2467]: E1002 19:16:13.168142    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.168344 kubelet[2467]: E1002 19:16:13.168297    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.168344 kubelet[2467]: W1002 19:16:13.168305    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.168344 kubelet[2467]: E1002 19:16:13.168320    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.168526 kubelet[2467]: E1002 19:16:13.168511    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.168526 kubelet[2467]: W1002 19:16:13.168527    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.168643 kubelet[2467]: E1002 19:16:13.168541    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.168731 kubelet[2467]: E1002 19:16:13.168715    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.168790 kubelet[2467]: W1002 19:16:13.168731    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.168790 kubelet[2467]: E1002 19:16:13.168746    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.168960 kubelet[2467]: E1002 19:16:13.168931    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.168960 kubelet[2467]: W1002 19:16:13.168958    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.169082 kubelet[2467]: E1002 19:16:13.168973    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.169169 kubelet[2467]: E1002 19:16:13.169153    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.169169 kubelet[2467]: W1002 19:16:13.169168    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.169275 kubelet[2467]: E1002 19:16:13.169183    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.169396 kubelet[2467]: E1002 19:16:13.169380    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.169451 kubelet[2467]: W1002 19:16:13.169396    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.169451 kubelet[2467]: E1002 19:16:13.169411    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.169689 kubelet[2467]: E1002 19:16:13.169671    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.169689 kubelet[2467]: W1002 19:16:13.169688    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.169810 kubelet[2467]: E1002 19:16:13.169704    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.169881 kubelet[2467]: E1002 19:16:13.169865    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.169928 kubelet[2467]: W1002 19:16:13.169882    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.169928 kubelet[2467]: E1002 19:16:13.169896    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.170082 kubelet[2467]: E1002 19:16:13.170068    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.170137 kubelet[2467]: W1002 19:16:13.170083    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.170137 kubelet[2467]: E1002 19:16:13.170097    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.170319 kubelet[2467]: E1002 19:16:13.170301    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.170319 kubelet[2467]: W1002 19:16:13.170317    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.170440 kubelet[2467]: E1002 19:16:13.170332    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.170513 kubelet[2467]: E1002 19:16:13.170499    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.170572 kubelet[2467]: W1002 19:16:13.170514    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.170572 kubelet[2467]: E1002 19:16:13.170528    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.170696 kubelet[2467]: E1002 19:16:13.170682    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.170744 kubelet[2467]: W1002 19:16:13.170698    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.170744 kubelet[2467]: E1002 19:16:13.170712    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.170885 kubelet[2467]: E1002 19:16:13.170870    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.172971 kubelet[2467]: W1002 19:16:13.170885    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.172971 kubelet[2467]: E1002 19:16:13.170899    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.180155 kubelet[2467]: E1002 19:16:13.179118    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.180155 kubelet[2467]: W1002 19:16:13.179133    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.180155 kubelet[2467]: E1002 19:16:13.179160    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.184071 env[1311]: time="2023-10-02T19:16:13.183299902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5947df9844-mzrgg,Uid:688b660c-59dc-4b13-a0e0-1700293ef24f,Namespace:calico-system,Attempt:0,}"
Oct  2 19:16:13.185214 kubelet[2467]: E1002 19:16:13.185200    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.185305 kubelet[2467]: W1002 19:16:13.185295    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.185380 kubelet[2467]: E1002 19:16:13.185373    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.198688 kubelet[2467]: E1002 19:16:13.198673    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:13.198811 kubelet[2467]: W1002 19:16:13.198799    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:13.198884 kubelet[2467]: E1002 19:16:13.198876    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:13.237451 env[1311]: time="2023-10-02T19:16:13.237286863Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:13.237451 env[1311]: time="2023-10-02T19:16:13.237385565Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:13.237451 env[1311]: time="2023-10-02T19:16:13.237412766Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:13.240808 env[1311]: time="2023-10-02T19:16:13.238179484Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1 pid=2903 runtime=io.containerd.runc.v2
Oct  2 19:16:13.252175 systemd[1]: Started cri-containerd-a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1.scope.
Oct  2 19:16:13.274033 env[1311]: time="2023-10-02T19:16:13.273988120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hl64d,Uid:d2341403-c352-4000-92fb-682620162c02,Namespace:calico-system,Attempt:0,}"
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.274000 audit: BPF prog-id=122 op=LOAD
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit: BPF prog-id=123 op=LOAD
Oct  2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003aabb0 items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit: BPF prog-id=124 op=LOAD
Oct  2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003aabf8 items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738
Oct  2 19:16:13.276000 audit: BPF prog-id=124 op=UNLOAD
Oct  2 19:16:13.276000 audit: BPF prog-id=123 op=UNLOAD
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { perfmon } for  pid=2912 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit[2912]: AVC avc:  denied  { bpf } for  pid=2912 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.276000 audit: BPF prog-id=125 op=LOAD
Oct  2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003ab008 items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738
Oct  2 19:16:13.323147 env[1311]: time="2023-10-02T19:16:13.323079867Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:13.323370 env[1311]: time="2023-10-02T19:16:13.323336773Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:13.323521 env[1311]: time="2023-10-02T19:16:13.323494477Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:13.323769 env[1311]: time="2023-10-02T19:16:13.323731482Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584 pid=2937 runtime=io.containerd.runc.v2
Oct  2 19:16:13.342632 systemd[1]: Started cri-containerd-3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584.scope.
Oct  2 19:16:13.346984 env[1311]: time="2023-10-02T19:16:13.346924424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5947df9844-mzrgg,Uid:688b660c-59dc-4b13-a0e0-1700293ef24f,Namespace:calico-system,Attempt:0,} returns sandbox id \"a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1\""
Oct  2 19:16:13.348898 env[1311]: time="2023-10-02T19:16:13.348847069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\""
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.367000 audit: BPF prog-id=126 op=LOAD
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit: BPF prog-id=127 op=LOAD
Oct  2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024990 items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit: BPF prog-id=128 op=LOAD
Oct  2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000249d8 items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137
Oct  2 19:16:13.368000 audit: BPF prog-id=128 op=UNLOAD
Oct  2 19:16:13.368000 audit: BPF prog-id=127 op=UNLOAD
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { perfmon } for  pid=2952 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit[2952]: AVC avc:  denied  { bpf } for  pid=2952 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:13.368000 audit: BPF prog-id=129 op=LOAD
Oct  2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024de8 items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137
Oct  2 19:16:13.386729 env[1311]: time="2023-10-02T19:16:13.386681553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hl64d,Uid:d2341403-c352-4000-92fb-682620162c02,Namespace:calico-system,Attempt:0,} returns sandbox id \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\""
Oct  2 19:16:13.851000 audit[2999]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:13.851000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe7bc35560 a2=0 a3=7ffe7bc3554c items=0 ppid=2658 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:13.852000 audit[2999]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:13.852000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe7bc35560 a2=0 a3=7ffe7bc3554c items=0 ppid=2658 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:13.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:15.568216 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3466921642.mount: Deactivated successfully.
Oct  2 19:16:18.261624 env[1311]: time="2023-10-02T19:16:18.261570309Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:18.269109 env[1311]: time="2023-10-02T19:16:18.269072267Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:18.274199 env[1311]: time="2023-10-02T19:16:18.274168974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:18.278492 env[1311]: time="2023-10-02T19:16:18.278456965Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:18.279284 env[1311]: time="2023-10-02T19:16:18.279246781Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\""
Oct  2 19:16:18.280848 env[1311]: time="2023-10-02T19:16:18.280817114Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\""
Oct  2 19:16:18.281984 env[1311]: time="2023-10-02T19:16:18.281951538Z" level=info msg="CreateContainer within sandbox \"a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}"
Oct  2 19:16:18.313074 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1079914586.mount: Deactivated successfully.
Oct  2 19:16:18.330910 env[1311]: time="2023-10-02T19:16:18.330870067Z" level=info msg="CreateContainer within sandbox \"a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"5d0584a077559ae32c718381626350a104f7aad67c6e95c5b0e4c249b9ad02d0\""
Oct  2 19:16:18.331527 env[1311]: time="2023-10-02T19:16:18.331489480Z" level=info msg="StartContainer for \"5d0584a077559ae32c718381626350a104f7aad67c6e95c5b0e4c249b9ad02d0\""
Oct  2 19:16:18.353412 systemd[1]: Started cri-containerd-5d0584a077559ae32c718381626350a104f7aad67c6e95c5b0e4c249b9ad02d0.scope.
Oct  2 19:16:18.384995 kernel: kauditd_printk_skb: 122 callbacks suppressed
Oct  2 19:16:18.385109 kernel: audit: type=1400 audit(1696274178.366:1093): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.366000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.366000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.366000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.413886 kernel: audit: type=1400 audit(1696274178.366:1094): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.413990 kernel: audit: type=1400 audit(1696274178.366:1095): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.427438 kernel: audit: type=1400 audit(1696274178.366:1096): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.427495 kernel: audit: type=1400 audit(1696274178.366:1097): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.453678 kernel: audit: type=1400 audit(1696274178.366:1098): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.482710 kernel: audit: type=1400 audit(1696274178.366:1099): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.482784 kernel: audit: type=1400 audit(1696274178.366:1100): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.482825 kernel: audit: type=1400 audit(1696274178.366:1101): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.366000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.483079 env[1311]: time="2023-10-02T19:16:18.483046267Z" level=info msg="StartContainer for \"5d0584a077559ae32c718381626350a104f7aad67c6e95c5b0e4c249b9ad02d0\" returns successfully"
Oct  2 19:16:18.384000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.513631 kernel: audit: type=1400 audit(1696274178.384:1102): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit: BPF prog-id=130 op=LOAD
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit: BPF prog-id=131 op=LOAD
Oct  2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000300f00 items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit: BPF prog-id=132 op=LOAD
Oct  2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000300f48 items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335
Oct  2 19:16:18.384000 audit: BPF prog-id=132 op=UNLOAD
Oct  2 19:16:18.384000 audit: BPF prog-id=131 op=UNLOAD
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { perfmon } for  pid=3008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit[3008]: AVC avc:  denied  { bpf } for  pid=3008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:18.384000 audit: BPF prog-id=133 op=LOAD
Oct  2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000301358 items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335
Oct  2 19:16:19.205888 kubelet[2467]: I1002 19:16:19.205853    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5947df9844-mzrgg" podStartSLOduration=-9.22337202964896e+09 pod.CreationTimestamp="2023-10-02 19:16:12 +0000 UTC" firstStartedPulling="2023-10-02 19:16:13.348243255 +0000 UTC m=+19.463425096" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:19.204659059 +0000 UTC m=+25.319840900" watchObservedRunningTime="2023-10-02 19:16:19.205815582 +0000 UTC m=+25.320997423"
Oct  2 19:16:19.262000 audit[3065]: NETFILTER_CFG table=filter:113 family=2 entries=13 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:19.262000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd1bf2a7c0 a2=0 a3=7ffd1bf2a7ac items=0 ppid=2658 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:19.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:19.263000 audit[3065]: NETFILTER_CFG table=nat:114 family=2 entries=27 op=nft_register_chain pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:19.263000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd1bf2a7c0 a2=0 a3=7ffd1bf2a7ac items=0 ppid=2658 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:19.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:19.296332 kubelet[2467]: E1002 19:16:19.296274    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.296332 kubelet[2467]: W1002 19:16:19.296328    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.296639 kubelet[2467]: E1002 19:16:19.296383    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.296696 kubelet[2467]: E1002 19:16:19.296639    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.296696 kubelet[2467]: W1002 19:16:19.296649    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.296696 kubelet[2467]: E1002 19:16:19.296664    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.296835 kubelet[2467]: E1002 19:16:19.296829    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.296883 kubelet[2467]: W1002 19:16:19.296838    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.296883 kubelet[2467]: E1002 19:16:19.296852    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.297112 kubelet[2467]: E1002 19:16:19.297094    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.297112 kubelet[2467]: W1002 19:16:19.297112    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.297246 kubelet[2467]: E1002 19:16:19.297129    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.297314 kubelet[2467]: E1002 19:16:19.297300    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.297370 kubelet[2467]: W1002 19:16:19.297315    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.297370 kubelet[2467]: E1002 19:16:19.297329    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.297504 kubelet[2467]: E1002 19:16:19.297490    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.297552 kubelet[2467]: W1002 19:16:19.297505    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.297552 kubelet[2467]: E1002 19:16:19.297519    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.297778 kubelet[2467]: E1002 19:16:19.297761    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.297778 kubelet[2467]: W1002 19:16:19.297776    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.297909 kubelet[2467]: E1002 19:16:19.297792    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.297994 kubelet[2467]: E1002 19:16:19.297981    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.298067 kubelet[2467]: W1002 19:16:19.297995    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.298067 kubelet[2467]: E1002 19:16:19.298010    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.298196 kubelet[2467]: E1002 19:16:19.298181    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.298267 kubelet[2467]: W1002 19:16:19.298196    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.298267 kubelet[2467]: E1002 19:16:19.298210    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.298401 kubelet[2467]: E1002 19:16:19.298386    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.298401 kubelet[2467]: W1002 19:16:19.298401    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.298515 kubelet[2467]: E1002 19:16:19.298415    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.298593 kubelet[2467]: E1002 19:16:19.298579    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.298662 kubelet[2467]: W1002 19:16:19.298594    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.298662 kubelet[2467]: E1002 19:16:19.298608    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.298797 kubelet[2467]: E1002 19:16:19.298783    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.298854 kubelet[2467]: W1002 19:16:19.298797    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.298854 kubelet[2467]: E1002 19:16:19.298812    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.316623 kubelet[2467]: E1002 19:16:19.316602    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.316623 kubelet[2467]: W1002 19:16:19.316616    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.316793 kubelet[2467]: E1002 19:16:19.316633    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.316931 kubelet[2467]: E1002 19:16:19.316913    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.316931 kubelet[2467]: W1002 19:16:19.316927    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.317069 kubelet[2467]: E1002 19:16:19.316974    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.317244 kubelet[2467]: E1002 19:16:19.317227    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.317244 kubelet[2467]: W1002 19:16:19.317239    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.317392 kubelet[2467]: E1002 19:16:19.317257    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.317510 kubelet[2467]: E1002 19:16:19.317491    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.317567 kubelet[2467]: W1002 19:16:19.317505    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.317567 kubelet[2467]: E1002 19:16:19.317530    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.317782 kubelet[2467]: E1002 19:16:19.317760    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.317782 kubelet[2467]: W1002 19:16:19.317772    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.317980 kubelet[2467]: E1002 19:16:19.317791    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.317980 kubelet[2467]: E1002 19:16:19.317978    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.318076 kubelet[2467]: W1002 19:16:19.317989    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.318076 kubelet[2467]: E1002 19:16:19.318003    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.318205 kubelet[2467]: E1002 19:16:19.318188    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.318205 kubelet[2467]: W1002 19:16:19.318202    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.318313 kubelet[2467]: E1002 19:16:19.318216    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.318562 kubelet[2467]: E1002 19:16:19.318544    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.318562 kubelet[2467]: W1002 19:16:19.318557    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.318702 kubelet[2467]: E1002 19:16:19.318577    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.318796 kubelet[2467]: E1002 19:16:19.318782    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.318796 kubelet[2467]: W1002 19:16:19.318793    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.318921 kubelet[2467]: E1002 19:16:19.318874    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.319034 kubelet[2467]: E1002 19:16:19.319020    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.319034 kubelet[2467]: W1002 19:16:19.319031    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.319160 kubelet[2467]: E1002 19:16:19.319111    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.319258 kubelet[2467]: E1002 19:16:19.319244    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.319258 kubelet[2467]: W1002 19:16:19.319255    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.319383 kubelet[2467]: E1002 19:16:19.319273    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.319473 kubelet[2467]: E1002 19:16:19.319460    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.319473 kubelet[2467]: W1002 19:16:19.319471    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.319581 kubelet[2467]: E1002 19:16:19.319489    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.319732 kubelet[2467]: E1002 19:16:19.319714    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.319732 kubelet[2467]: W1002 19:16:19.319728    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.319838 kubelet[2467]: E1002 19:16:19.319746    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.320127 kubelet[2467]: E1002 19:16:19.320111    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.320127 kubelet[2467]: W1002 19:16:19.320123    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.320271 kubelet[2467]: E1002 19:16:19.320145    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.320359 kubelet[2467]: E1002 19:16:19.320340    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.320359 kubelet[2467]: W1002 19:16:19.320354    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.320486 kubelet[2467]: E1002 19:16:19.320369    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.320552 kubelet[2467]: E1002 19:16:19.320535    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.320552 kubelet[2467]: W1002 19:16:19.320551    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.320673 kubelet[2467]: E1002 19:16:19.320565    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.320768 kubelet[2467]: E1002 19:16:19.320755    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.320768 kubelet[2467]: W1002 19:16:19.320766    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.320899 kubelet[2467]: E1002 19:16:19.320780    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:19.321646 kubelet[2467]: E1002 19:16:19.321629    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:19.321646 kubelet[2467]: W1002 19:16:19.321642    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:19.321761 kubelet[2467]: E1002 19:16:19.321657    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.203115 kubelet[2467]: E1002 19:16:20.203090    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.203115 kubelet[2467]: W1002 19:16:20.203107    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.203337 kubelet[2467]: E1002 19:16:20.203128    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.203337 kubelet[2467]: E1002 19:16:20.203323    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.203337 kubelet[2467]: W1002 19:16:20.203332    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.203535 kubelet[2467]: E1002 19:16:20.203347    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.203535 kubelet[2467]: E1002 19:16:20.203534    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.203635 kubelet[2467]: W1002 19:16:20.203544    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.203635 kubelet[2467]: E1002 19:16:20.203560    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.203796 kubelet[2467]: E1002 19:16:20.203780    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.203796 kubelet[2467]: W1002 19:16:20.203792    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.203928 kubelet[2467]: E1002 19:16:20.203807    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.204016 kubelet[2467]: E1002 19:16:20.204000    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.204016 kubelet[2467]: W1002 19:16:20.204013    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.204166 kubelet[2467]: E1002 19:16:20.204029    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.204252 kubelet[2467]: E1002 19:16:20.204195    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.204252 kubelet[2467]: W1002 19:16:20.204212    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.204252 kubelet[2467]: E1002 19:16:20.204229    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.204474 kubelet[2467]: E1002 19:16:20.204460    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.204612 kubelet[2467]: W1002 19:16:20.204551    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.204695 kubelet[2467]: E1002 19:16:20.204678    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.205011 kubelet[2467]: E1002 19:16:20.204875    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.205011 kubelet[2467]: W1002 19:16:20.204900    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.205011 kubelet[2467]: E1002 19:16:20.204916    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.205211 kubelet[2467]: E1002 19:16:20.205196    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.205211 kubelet[2467]: W1002 19:16:20.205208    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.205323 kubelet[2467]: E1002 19:16:20.205223    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.205442 kubelet[2467]: E1002 19:16:20.205427    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.205442 kubelet[2467]: W1002 19:16:20.205438    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.205554 kubelet[2467]: E1002 19:16:20.205456    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.205746 kubelet[2467]: E1002 19:16:20.205728    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.205746 kubelet[2467]: W1002 19:16:20.205740    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.205875 kubelet[2467]: E1002 19:16:20.205756    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.205962 kubelet[2467]: E1002 19:16:20.205930    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.205962 kubelet[2467]: W1002 19:16:20.205960    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.206339 kubelet[2467]: E1002 19:16:20.205976    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.224600 kubelet[2467]: E1002 19:16:20.224580    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.224600 kubelet[2467]: W1002 19:16:20.224594    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.224729 kubelet[2467]: E1002 19:16:20.224610    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.224898 kubelet[2467]: E1002 19:16:20.224881    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.224898 kubelet[2467]: W1002 19:16:20.224894    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.225055 kubelet[2467]: E1002 19:16:20.224915    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.225141 kubelet[2467]: E1002 19:16:20.225122    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.225141 kubelet[2467]: W1002 19:16:20.225136    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.225311 kubelet[2467]: E1002 19:16:20.225152    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.225815 kubelet[2467]: E1002 19:16:20.225792    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.225815 kubelet[2467]: W1002 19:16:20.225814    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.225969 kubelet[2467]: E1002 19:16:20.225832    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.226063 kubelet[2467]: E1002 19:16:20.226047    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.226115 kubelet[2467]: W1002 19:16:20.226065    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.226115 kubelet[2467]: E1002 19:16:20.226108    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.226298 kubelet[2467]: E1002 19:16:20.226276    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.226351 kubelet[2467]: W1002 19:16:20.226301    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.226351 kubelet[2467]: E1002 19:16:20.226317    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.226526 kubelet[2467]: E1002 19:16:20.226510    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.226576 kubelet[2467]: W1002 19:16:20.226526    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.226576 kubelet[2467]: E1002 19:16:20.226540    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.231768 kubelet[2467]: E1002 19:16:20.231749    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.231768 kubelet[2467]: W1002 19:16:20.231766    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.231894 kubelet[2467]: E1002 19:16:20.231789    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.234215 kubelet[2467]: E1002 19:16:20.234197    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.234215 kubelet[2467]: W1002 19:16:20.234213    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.234361 kubelet[2467]: E1002 19:16:20.234231    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.234410 kubelet[2467]: E1002 19:16:20.234397    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.234410 kubelet[2467]: W1002 19:16:20.234406    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.234514 kubelet[2467]: E1002 19:16:20.234420    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.234579 kubelet[2467]: E1002 19:16:20.234565    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.234625 kubelet[2467]: W1002 19:16:20.234581    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.234625 kubelet[2467]: E1002 19:16:20.234595    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.234963 kubelet[2467]: E1002 19:16:20.234805    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.234963 kubelet[2467]: W1002 19:16:20.234817    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.234963 kubelet[2467]: E1002 19:16:20.234831    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.235167 kubelet[2467]: E1002 19:16:20.235154    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.235212 kubelet[2467]: W1002 19:16:20.235168    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.235212 kubelet[2467]: E1002 19:16:20.235183    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.235366 kubelet[2467]: E1002 19:16:20.235351    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.235418 kubelet[2467]: W1002 19:16:20.235367    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.235418 kubelet[2467]: E1002 19:16:20.235380    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.235552 kubelet[2467]: E1002 19:16:20.235539    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.235603 kubelet[2467]: W1002 19:16:20.235553    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.235603 kubelet[2467]: E1002 19:16:20.235566    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.235730 kubelet[2467]: E1002 19:16:20.235717    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.235730 kubelet[2467]: W1002 19:16:20.235731    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.235730 kubelet[2467]: E1002 19:16:20.235744    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.235982 kubelet[2467]: E1002 19:16:20.235927    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.235982 kubelet[2467]: W1002 19:16:20.235936    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.235982 kubelet[2467]: E1002 19:16:20.235973    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:20.236333 kubelet[2467]: E1002 19:16:20.236316    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:20.236333 kubelet[2467]: W1002 19:16:20.236333    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:20.236433 kubelet[2467]: E1002 19:16:20.236348    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.213670 kubelet[2467]: E1002 19:16:21.213639    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.213670 kubelet[2467]: W1002 19:16:21.213664    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.213691    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.213884    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.214219 kubelet[2467]: W1002 19:16:21.213893    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.213908    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.214102    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.214219 kubelet[2467]: W1002 19:16:21.214111    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.214125    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.214559 kubelet[2467]: E1002 19:16:21.214333    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.214559 kubelet[2467]: W1002 19:16:21.214342    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.214559 kubelet[2467]: E1002 19:16:21.214355    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.214559 kubelet[2467]: E1002 19:16:21.214505    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.214559 kubelet[2467]: W1002 19:16:21.214514    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.214559 kubelet[2467]: E1002 19:16:21.214529    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.214901 kubelet[2467]: E1002 19:16:21.214679    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.214901 kubelet[2467]: W1002 19:16:21.214687    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.214901 kubelet[2467]: E1002 19:16:21.214700    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.215135 kubelet[2467]: E1002 19:16:21.214924    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.215135 kubelet[2467]: W1002 19:16:21.214934    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.215135 kubelet[2467]: E1002 19:16:21.214961    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.215135 kubelet[2467]: E1002 19:16:21.215133    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.215317 kubelet[2467]: W1002 19:16:21.215143    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.215317 kubelet[2467]: E1002 19:16:21.215157    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.215317 kubelet[2467]: E1002 19:16:21.215314    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.215453 kubelet[2467]: W1002 19:16:21.215323    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.215453 kubelet[2467]: E1002 19:16:21.215335    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.215536 kubelet[2467]: E1002 19:16:21.215502    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.215536 kubelet[2467]: W1002 19:16:21.215513    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.215536 kubelet[2467]: E1002 19:16:21.215525    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.215708 kubelet[2467]: E1002 19:16:21.215682    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.215783 kubelet[2467]: W1002 19:16:21.215767    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.215829 kubelet[2467]: E1002 19:16:21.215794    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.216011 kubelet[2467]: E1002 19:16:21.215995    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.216011 kubelet[2467]: W1002 19:16:21.216010    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.217530 kubelet[2467]: E1002 19:16:21.216026    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.232318 kubelet[2467]: E1002 19:16:21.232295    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.232318 kubelet[2467]: W1002 19:16:21.232311    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.232509 kubelet[2467]: E1002 19:16:21.232330    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.232649 kubelet[2467]: E1002 19:16:21.232631    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.232649 kubelet[2467]: W1002 19:16:21.232645    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.232836 kubelet[2467]: E1002 19:16:21.232666    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.233286 kubelet[2467]: E1002 19:16:21.232937    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.233286 kubelet[2467]: W1002 19:16:21.232969    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.233286 kubelet[2467]: E1002 19:16:21.232988    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.233286 kubelet[2467]: E1002 19:16:21.233233    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.233286 kubelet[2467]: W1002 19:16:21.233243    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.233286 kubelet[2467]: E1002 19:16:21.233261    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.233609 kubelet[2467]: E1002 19:16:21.233448    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.233609 kubelet[2467]: W1002 19:16:21.233459    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.233609 kubelet[2467]: E1002 19:16:21.233479    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.233735 kubelet[2467]: E1002 19:16:21.233678    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.233735 kubelet[2467]: W1002 19:16:21.233687    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.233735 kubelet[2467]: E1002 19:16:21.233705    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.233904 kubelet[2467]: E1002 19:16:21.233886    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.233973 kubelet[2467]: W1002 19:16:21.233899    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.233973 kubelet[2467]: E1002 19:16:21.233929    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.234185 kubelet[2467]: E1002 19:16:21.234169    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.234185 kubelet[2467]: W1002 19:16:21.234181    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234351    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234353    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.234765 kubelet[2467]: W1002 19:16:21.234464    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234660    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.234765 kubelet[2467]: W1002 19:16:21.234670    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234686    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234729    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.235129 kubelet[2467]: E1002 19:16:21.234856    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.235129 kubelet[2467]: W1002 19:16:21.234865    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.235129 kubelet[2467]: E1002 19:16:21.234883    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.235129 kubelet[2467]: E1002 19:16:21.235099    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.235129 kubelet[2467]: W1002 19:16:21.235108    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.235129 kubelet[2467]: E1002 19:16:21.235122    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.235515 kubelet[2467]: E1002 19:16:21.235497    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.235515 kubelet[2467]: W1002 19:16:21.235510    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.235651 kubelet[2467]: E1002 19:16:21.235528    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.235741 kubelet[2467]: E1002 19:16:21.235727    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.235741 kubelet[2467]: W1002 19:16:21.235739    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.235844 kubelet[2467]: E1002 19:16:21.235758    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.236001 kubelet[2467]: E1002 19:16:21.235984    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.236001 kubelet[2467]: W1002 19:16:21.235997    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.236121 kubelet[2467]: E1002 19:16:21.236012    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.236192 kubelet[2467]: E1002 19:16:21.236176    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.236192 kubelet[2467]: W1002 19:16:21.236188    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.236303 kubelet[2467]: E1002 19:16:21.236203    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.236399 kubelet[2467]: E1002 19:16:21.236382    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.236449 kubelet[2467]: W1002 19:16:21.236398    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.236449 kubelet[2467]: E1002 19:16:21.236413    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:21.236714 kubelet[2467]: E1002 19:16:21.236698    2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:16:21.236714 kubelet[2467]: W1002 19:16:21.236710    2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:16:21.236817 kubelet[2467]: E1002 19:16:21.236724    2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:16:22.139353 env[1311]: time="2023-10-02T19:16:22.139301959Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:22.149038 env[1311]: time="2023-10-02T19:16:22.149000448Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:22.156108 env[1311]: time="2023-10-02T19:16:22.156074885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:22.163105 env[1311]: time="2023-10-02T19:16:22.163072421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:22.164576 env[1311]: time="2023-10-02T19:16:22.164547450Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\""
Oct  2 19:16:22.167064 env[1311]: time="2023-10-02T19:16:22.167029298Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Oct  2 19:16:22.220019 env[1311]: time="2023-10-02T19:16:22.219928425Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d\""
Oct  2 19:16:22.221078 env[1311]: time="2023-10-02T19:16:22.221043847Z" level=info msg="StartContainer for \"2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d\""
Oct  2 19:16:22.250731 systemd[1]: run-containerd-runc-k8s.io-2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d-runc.NhRtUf.mount: Deactivated successfully.
Oct  2 19:16:22.252516 systemd[1]: Started cri-containerd-2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d.scope.
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2937 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:22.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626132393733383165353061626437373637393139323530383032
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit: BPF prog-id=134 op=LOAD
Oct  2 19:16:22.273000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002cfda0 items=0 ppid=2937 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:22.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626132393733383165353061626437373637393139323530383032
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit: BPF prog-id=135 op=LOAD
Oct  2 19:16:22.273000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002cfde8 items=0 ppid=2937 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:22.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626132393733383165353061626437373637393139323530383032
Oct  2 19:16:22.273000 audit: BPF prog-id=135 op=UNLOAD
Oct  2 19:16:22.273000 audit: BPF prog-id=134 op=UNLOAD
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { perfmon } for  pid=3162 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit[3162]: AVC avc:  denied  { bpf } for  pid=3162 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:22.273000 audit: BPF prog-id=136 op=LOAD
Oct  2 19:16:22.273000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002cfe78 items=0 ppid=2937 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:22.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626132393733383165353061626437373637393139323530383032
Oct  2 19:16:22.302844 env[1311]: time="2023-10-02T19:16:22.302802135Z" level=info msg="StartContainer for \"2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d\" returns successfully"
Oct  2 19:16:22.327349 systemd[1]: cri-containerd-2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d.scope: Deactivated successfully.
Oct  2 19:16:22.330000 audit: BPF prog-id=136 op=UNLOAD
Oct  2 19:16:23.193412 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d-rootfs.mount: Deactivated successfully.
Oct  2 19:16:23.545580 env[1311]: time="2023-10-02T19:16:23.545169458Z" level=info msg="shim disconnected" id=2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d
Oct  2 19:16:23.545580 env[1311]: time="2023-10-02T19:16:23.545233959Z" level=warning msg="cleaning up after shim disconnected" id=2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d namespace=k8s.io
Oct  2 19:16:23.545580 env[1311]: time="2023-10-02T19:16:23.545246259Z" level=info msg="cleaning up dead shim"
Oct  2 19:16:23.553195 env[1311]: time="2023-10-02T19:16:23.553156910Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:16:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3203 runtime=io.containerd.runc.v2\n"
Oct  2 19:16:24.210610 env[1311]: time="2023-10-02T19:16:24.210569556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\""
Oct  2 19:16:26.125331 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1288011836.mount: Deactivated successfully.
Oct  2 19:16:30.790200 env[1311]: time="2023-10-02T19:16:30.790078854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:30.803928 env[1311]: time="2023-10-02T19:16:30.803788784Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:30.808207 env[1311]: time="2023-10-02T19:16:30.808126056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:30.812173 env[1311]: time="2023-10-02T19:16:30.812141423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:30.812787 env[1311]: time="2023-10-02T19:16:30.812754534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\""
Oct  2 19:16:30.816846 env[1311]: time="2023-10-02T19:16:30.816817402Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Oct  2 19:16:30.849335 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1673546424.mount: Deactivated successfully.
Oct  2 19:16:30.856703 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2196771332.mount: Deactivated successfully.
Oct  2 19:16:30.874330 env[1311]: time="2023-10-02T19:16:30.874283864Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6\""
Oct  2 19:16:30.875205 env[1311]: time="2023-10-02T19:16:30.875174879Z" level=info msg="StartContainer for \"d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6\""
Oct  2 19:16:30.901606 systemd[1]: Started cri-containerd-d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6.scope.
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.923233 kernel: kauditd_printk_skb: 97 callbacks suppressed
Oct  2 19:16:30.923321 kernel: audit: type=1400 audit(1696274190.917:1120): avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:30.957969 kernel: audit: type=1300 audit(1696274190.917:1120): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:30.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.991229 env[1311]: time="2023-10-02T19:16:30.991193522Z" level=info msg="StartContainer for \"d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6\" returns successfully"
Oct  2 19:16:30.996627 kernel: audit: type=1327 audit(1696274190.917:1120): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462
Oct  2 19:16:30.996718 kernel: audit: type=1400 audit(1696274190.917:1121): avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.999983 kernel: audit: type=1400 audit(1696274190.917:1121): avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:31.021654 kernel: audit: type=1400 audit(1696274190.917:1121): avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:31.034601 kernel: audit: type=1400 audit(1696274190.917:1121): avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:31.034736 kernel: audit: type=1400 audit(1696274190.917:1121): avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:31.047150 kernel: audit: type=1400 audit(1696274190.917:1121): avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:31.076982 kernel: audit: type=1400 audit(1696274190.917:1121): avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.917000 audit: BPF prog-id=137 op=LOAD
Oct  2 19:16:30.917000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000304740 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:30.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462
Oct  2 19:16:30.936000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.936000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.936000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.936000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.936000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.936000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.936000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.936000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.936000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.936000 audit: BPF prog-id=138 op=LOAD
Oct  2 19:16:30.936000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000304788 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:30.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462
Oct  2 19:16:30.956000 audit: BPF prog-id=138 op=UNLOAD
Oct  2 19:16:30.956000 audit: BPF prog-id=137 op=UNLOAD
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { perfmon } for  pid=3224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit[3224]: AVC avc:  denied  { bpf } for  pid=3224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:30.956000 audit: BPF prog-id=139 op=LOAD
Oct  2 19:16:30.956000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000304818 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:30.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462
Oct  2 19:16:32.591471 env[1311]: time="2023-10-02T19:16:32.591404600Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Oct  2 19:16:32.594879 systemd[1]: cri-containerd-d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6.scope: Deactivated successfully.
Oct  2 19:16:32.597000 audit: BPF prog-id=139 op=UNLOAD
Oct  2 19:16:32.615604 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6-rootfs.mount: Deactivated successfully.
Oct  2 19:16:32.631106 kubelet[2467]: I1002 19:16:32.630173    2467 kubelet_node_status.go:493] "Fast updating node status as it just became ready"
Oct  2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.655098    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.666358    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.667870    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.688239    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.708186    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sntnx\" (UniqueName: \"kubernetes.io/projected/6efed0db-4734-47a7-afef-8e4f010b2a81-kube-api-access-sntnx\") pod \"coredns-787d4945fb-mdww6\" (UID: \"6efed0db-4734-47a7-afef-8e4f010b2a81\") " pod="kube-system/coredns-787d4945fb-mdww6"
Oct  2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.708232    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cf67d82a-6eeb-4bf3-adec-800e8c7dc360-config-volume\") pod \"coredns-787d4945fb-9tz2t\" (UID: \"cf67d82a-6eeb-4bf3-adec-800e8c7dc360\") " pod="kube-system/coredns-787d4945fb-9tz2t"
Oct  2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.708341    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-varrun\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr"
Oct  2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.708427    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-etccalico\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr"
Oct  2 19:16:32.661364 systemd[1]: Created slice kubepods-burstable-pod6efed0db_4734_47a7_afef_8e4f010b2a81.slice.
Oct  2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708546    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r78km\" (UniqueName: \"kubernetes.io/projected/cf67d82a-6eeb-4bf3-adec-800e8c7dc360-kube-api-access-r78km\") pod \"coredns-787d4945fb-9tz2t\" (UID: \"cf67d82a-6eeb-4bf3-adec-800e8c7dc360\") " pod="kube-system/coredns-787d4945fb-9tz2t"
Oct  2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708589    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kp4ht\" (UniqueName: \"kubernetes.io/projected/51cd6516-73d5-4525-9aa3-c3b0c6013145-kube-api-access-kp4ht\") pod \"calico-kube-controllers-69c848ddc6-z4r7k\" (UID: \"51cd6516-73d5-4525-9aa3-c3b0c6013145\") " pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k"
Oct  2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708621    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-socket-dir\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr"
Oct  2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708649    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-44fmr\" (UniqueName: \"kubernetes.io/projected/51cdf950-fd56-4099-b416-942f3ef06aee-kube-api-access-44fmr\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr"
Oct  2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708682    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-registration-dir\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr"
Oct  2 19:16:32.674520 systemd[1]: Created slice kubepods-besteffort-pod51cd6516_73d5_4525_9aa3_c3b0c6013145.slice.
Oct  2 19:16:33.122182 kubelet[2467]: I1002 19:16:32.708716    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6efed0db-4734-47a7-afef-8e4f010b2a81-config-volume\") pod \"coredns-787d4945fb-mdww6\" (UID: \"6efed0db-4734-47a7-afef-8e4f010b2a81\") " pod="kube-system/coredns-787d4945fb-mdww6"
Oct  2 19:16:33.122182 kubelet[2467]: I1002 19:16:32.708748    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-kubelet-dir\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr"
Oct  2 19:16:32.682120 systemd[1]: Created slice kubepods-burstable-podcf67d82a_6eeb_4bf3_adec_800e8c7dc360.slice.
Oct  2 19:16:32.693634 systemd[1]: Created slice kubepods-besteffort-pod51cdf950_fd56_4099_b416_942f3ef06aee.slice.
Oct  2 19:16:33.474771 env[1311]: time="2023-10-02T19:16:33.474268757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mdww6,Uid:6efed0db-4734-47a7-afef-8e4f010b2a81,Namespace:kube-system,Attempt:0,}"
Oct  2 19:16:33.475743 env[1311]: time="2023-10-02T19:16:33.475498577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9tz2t,Uid:cf67d82a-6eeb-4bf3-adec-800e8c7dc360,Namespace:kube-system,Attempt:0,}"
Oct  2 19:16:33.476799 env[1311]: time="2023-10-02T19:16:33.476431892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-484pr,Uid:51cdf950-fd56-4099-b416-942f3ef06aee,Namespace:calico-system,Attempt:0,}"
Oct  2 19:16:33.476799 env[1311]: time="2023-10-02T19:16:33.476431492Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-z4r7k,Uid:51cd6516-73d5-4525-9aa3-c3b0c6013145,Namespace:calico-system,Attempt:0,}"
Oct  2 19:16:34.199711 env[1311]: time="2023-10-02T19:16:34.199655546Z" level=info msg="shim disconnected" id=d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6
Oct  2 19:16:34.199711 env[1311]: time="2023-10-02T19:16:34.199704247Z" level=warning msg="cleaning up after shim disconnected" id=d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6 namespace=k8s.io
Oct  2 19:16:34.199711 env[1311]: time="2023-10-02T19:16:34.199715747Z" level=info msg="cleaning up dead shim"
Oct  2 19:16:34.210032 env[1311]: time="2023-10-02T19:16:34.209986408Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:16:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3280 runtime=io.containerd.runc.v2\n"
Oct  2 19:16:34.233392 env[1311]: time="2023-10-02T19:16:34.231552045Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\""
Oct  2 19:16:34.456271 env[1311]: time="2023-10-02T19:16:34.455882855Z" level=error msg="Failed to destroy network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.456451 env[1311]: time="2023-10-02T19:16:34.456407163Z" level=error msg="encountered an error cleaning up failed sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.456534 env[1311]: time="2023-10-02T19:16:34.456480565Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9tz2t,Uid:cf67d82a-6eeb-4bf3-adec-800e8c7dc360,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.456755 kubelet[2467]: E1002 19:16:34.456731    2467 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.457149 kubelet[2467]: E1002 19:16:34.456795    2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-9tz2t"
Oct  2 19:16:34.457149 kubelet[2467]: E1002 19:16:34.456829    2467 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-9tz2t"
Oct  2 19:16:34.457149 kubelet[2467]: E1002 19:16:34.456902    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-9tz2t_kube-system(cf67d82a-6eeb-4bf3-adec-800e8c7dc360)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-9tz2t_kube-system(cf67d82a-6eeb-4bf3-adec-800e8c7dc360)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-9tz2t" podUID=cf67d82a-6eeb-4bf3-adec-800e8c7dc360
Oct  2 19:16:34.494174 env[1311]: time="2023-10-02T19:16:34.494103853Z" level=error msg="Failed to destroy network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.494533 env[1311]: time="2023-10-02T19:16:34.494485059Z" level=error msg="encountered an error cleaning up failed sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.494625 env[1311]: time="2023-10-02T19:16:34.494568361Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mdww6,Uid:6efed0db-4734-47a7-afef-8e4f010b2a81,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.494841 kubelet[2467]: E1002 19:16:34.494817    2467 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.494968 kubelet[2467]: E1002 19:16:34.494890    2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-mdww6"
Oct  2 19:16:34.494968 kubelet[2467]: E1002 19:16:34.494922    2467 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-mdww6"
Oct  2 19:16:34.495078 kubelet[2467]: E1002 19:16:34.495002    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-mdww6_kube-system(6efed0db-4734-47a7-afef-8e4f010b2a81)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-mdww6_kube-system(6efed0db-4734-47a7-afef-8e4f010b2a81)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-mdww6" podUID=6efed0db-4734-47a7-afef-8e4f010b2a81
Oct  2 19:16:34.500577 env[1311]: time="2023-10-02T19:16:34.500528354Z" level=error msg="Failed to destroy network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.500880 env[1311]: time="2023-10-02T19:16:34.500835059Z" level=error msg="encountered an error cleaning up failed sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.500972 env[1311]: time="2023-10-02T19:16:34.500895960Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-z4r7k,Uid:51cd6516-73d5-4525-9aa3-c3b0c6013145,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.501129 kubelet[2467]: E1002 19:16:34.501106    2467 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.501217 kubelet[2467]: E1002 19:16:34.501161    2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k"
Oct  2 19:16:34.501217 kubelet[2467]: E1002 19:16:34.501191    2467 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k"
Oct  2 19:16:34.501311 kubelet[2467]: E1002 19:16:34.501249    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-69c848ddc6-z4r7k_calico-system(51cd6516-73d5-4525-9aa3-c3b0c6013145)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-69c848ddc6-z4r7k_calico-system(51cd6516-73d5-4525-9aa3-c3b0c6013145)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k" podUID=51cd6516-73d5-4525-9aa3-c3b0c6013145
Oct  2 19:16:34.518798 env[1311]: time="2023-10-02T19:16:34.518741739Z" level=error msg="Failed to destroy network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.519135 env[1311]: time="2023-10-02T19:16:34.519097044Z" level=error msg="encountered an error cleaning up failed sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.519222 env[1311]: time="2023-10-02T19:16:34.519164345Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-484pr,Uid:51cdf950-fd56-4099-b416-942f3ef06aee,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.519405 kubelet[2467]: E1002 19:16:34.519383    2467 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:34.519511 kubelet[2467]: E1002 19:16:34.519441    2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-484pr"
Oct  2 19:16:34.519511 kubelet[2467]: E1002 19:16:34.519472    2467 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-484pr"
Oct  2 19:16:34.519609 kubelet[2467]: E1002 19:16:34.519536    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:16:35.232592 kubelet[2467]: I1002 19:16:35.232560    2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:35.233335 env[1311]: time="2023-10-02T19:16:35.233258661Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\""
Oct  2 19:16:35.236749 kubelet[2467]: I1002 19:16:35.236724    2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:35.237444 env[1311]: time="2023-10-02T19:16:35.237402025Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\""
Oct  2 19:16:35.241005 kubelet[2467]: I1002 19:16:35.240464    2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:35.241319 env[1311]: time="2023-10-02T19:16:35.241282684Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\""
Oct  2 19:16:35.243583 kubelet[2467]: I1002 19:16:35.243158    2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:35.243903 env[1311]: time="2023-10-02T19:16:35.243866724Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\""
Oct  2 19:16:35.309258 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f-shm.mount: Deactivated successfully.
Oct  2 19:16:35.309361 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e-shm.mount: Deactivated successfully.
Oct  2 19:16:35.309435 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44-shm.mount: Deactivated successfully.
Oct  2 19:16:35.337350 env[1311]: time="2023-10-02T19:16:35.337283962Z" level=error msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" failed" error="failed to destroy network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:35.337826 kubelet[2467]: E1002 19:16:35.337802    2467 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:35.337966 kubelet[2467]: E1002 19:16:35.337864    2467 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e}
Oct  2 19:16:35.337966 kubelet[2467]: E1002 19:16:35.337924    2467 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cf67d82a-6eeb-4bf3-adec-800e8c7dc360\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:16:35.338125 kubelet[2467]: E1002 19:16:35.337992    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cf67d82a-6eeb-4bf3-adec-800e8c7dc360\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-9tz2t" podUID=cf67d82a-6eeb-4bf3-adec-800e8c7dc360
Oct  2 19:16:35.346431 env[1311]: time="2023-10-02T19:16:35.346374202Z" level=error msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" failed" error="failed to destroy network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:35.346799 kubelet[2467]: E1002 19:16:35.346778    2467 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:35.346908 kubelet[2467]: E1002 19:16:35.346821    2467 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44}
Oct  2 19:16:35.346908 kubelet[2467]: E1002 19:16:35.346864    2467 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6efed0db-4734-47a7-afef-8e4f010b2a81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:16:35.347068 kubelet[2467]: E1002 19:16:35.346911    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6efed0db-4734-47a7-afef-8e4f010b2a81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-mdww6" podUID=6efed0db-4734-47a7-afef-8e4f010b2a81
Oct  2 19:16:35.347939 env[1311]: time="2023-10-02T19:16:35.347896026Z" level=error msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" failed" error="failed to destroy network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:35.348426 kubelet[2467]: E1002 19:16:35.348248    2467 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:35.348426 kubelet[2467]: E1002 19:16:35.348286    2467 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f}
Oct  2 19:16:35.348426 kubelet[2467]: E1002 19:16:35.348343    2467 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"51cdf950-fd56-4099-b416-942f3ef06aee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:16:35.348426 kubelet[2467]: E1002 19:16:35.348397    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"51cdf950-fd56-4099-b416-942f3ef06aee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:16:35.349572 env[1311]: time="2023-10-02T19:16:35.349532351Z" level=error msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" failed" error="failed to destroy network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:16:35.349712 kubelet[2467]: E1002 19:16:35.349694    2467 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:35.349794 kubelet[2467]: E1002 19:16:35.349726    2467 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d}
Oct  2 19:16:35.349794 kubelet[2467]: E1002 19:16:35.349769    2467 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"51cd6516-73d5-4525-9aa3-c3b0c6013145\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:16:35.349905 kubelet[2467]: E1002 19:16:35.349810    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"51cd6516-73d5-4525-9aa3-c3b0c6013145\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k" podUID=51cd6516-73d5-4525-9aa3-c3b0c6013145
Oct  2 19:16:40.881010 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4148316339.mount: Deactivated successfully.
Oct  2 19:16:40.979258 env[1311]: time="2023-10-02T19:16:40.979206493Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:40.985292 env[1311]: time="2023-10-02T19:16:40.985254379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:40.988451 env[1311]: time="2023-10-02T19:16:40.988419424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:40.991410 env[1311]: time="2023-10-02T19:16:40.991377066Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:40.991813 env[1311]: time="2023-10-02T19:16:40.991782572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\""
Oct  2 19:16:40.994205 env[1311]: time="2023-10-02T19:16:40.994172306Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Oct  2 19:16:41.022337 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2510689735.mount: Deactivated successfully.
Oct  2 19:16:41.029585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3203641660.mount: Deactivated successfully.
Oct  2 19:16:41.042768 env[1311]: time="2023-10-02T19:16:41.042725388Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5\""
Oct  2 19:16:41.043504 env[1311]: time="2023-10-02T19:16:41.043475299Z" level=info msg="StartContainer for \"5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5\""
Oct  2 19:16:41.062241 systemd[1]: Started cri-containerd-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5.scope.
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.085653 kernel: kauditd_printk_skb: 34 callbacks suppressed
Oct  2 19:16:41.085744 kernel: audit: type=1400 audit(1696274201.080:1127): avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:41.122158 kernel: audit: type=1300 audit(1696274201.080:1127): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234
Oct  2 19:16:41.143049 kernel: audit: type=1327 audit(1696274201.080:1127): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.158367 env[1311]: time="2023-10-02T19:16:41.155528570Z" level=info msg="StartContainer for \"5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5\" returns successfully"
Oct  2 19:16:41.167825 kernel: audit: type=1400 audit(1696274201.080:1128): avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.167925 kernel: audit: type=1400 audit(1696274201.080:1128): avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.193252 kernel: audit: type=1400 audit(1696274201.080:1128): avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.193334 kernel: audit: type=1400 audit(1696274201.080:1128): avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.205848 kernel: audit: type=1400 audit(1696274201.080:1128): avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.205932 kernel: audit: type=1400 audit(1696274201.080:1128): avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.219200 kernel: audit: type=1400 audit(1696274201.080:1128): avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit: BPF prog-id=140 op=LOAD
Oct  2 19:16:41.080000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d9bc0 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit: BPF prog-id=141 op=LOAD
Oct  2 19:16:41.080000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d9c08 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234
Oct  2 19:16:41.080000 audit: BPF prog-id=141 op=UNLOAD
Oct  2 19:16:41.080000 audit: BPF prog-id=140 op=UNLOAD
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { perfmon } for  pid=3514 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit[3514]: AVC avc:  denied  { bpf } for  pid=3514 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:41.080000 audit: BPF prog-id=142 op=LOAD
Oct  2 19:16:41.080000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d9c98 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234
Oct  2 19:16:41.499522 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Oct  2 19:16:41.499684 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Oct  2 19:16:42.287497 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.teDUDr.mount: Deactivated successfully.
Oct  2 19:16:42.854000 audit[3670]: AVC avc:  denied  { write } for  pid=3670 comm="tee" name="fd" dev="proc" ino=30530 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:16:42.857000 audit[3690]: AVC avc:  denied  { write } for  pid=3690 comm="tee" name="fd" dev="proc" ino=30533 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:16:42.854000 audit[3670]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd561da975 a2=241 a3=1b6 items=1 ppid=3630 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:42.854000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Oct  2 19:16:42.854000 audit: PATH item=0 name="/dev/fd/63" inode=30509 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:16:42.854000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:16:42.858000 audit[3664]: AVC avc:  denied  { write } for  pid=3664 comm="tee" name="fd" dev="proc" ino=30537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:16:42.860000 audit[3688]: AVC avc:  denied  { write } for  pid=3688 comm="tee" name="fd" dev="proc" ino=30543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:16:42.857000 audit[3690]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd98168976 a2=241 a3=1b6 items=1 ppid=3640 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:42.857000 audit: CWD cwd="/etc/service/enabled/bird/log"
Oct  2 19:16:42.857000 audit: PATH item=0 name="/dev/fd/63" inode=30527 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:16:42.857000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:16:42.858000 audit[3664]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7194c966 a2=241 a3=1b6 items=1 ppid=3626 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:42.858000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Oct  2 19:16:42.858000 audit: PATH item=0 name="/dev/fd/63" inode=31060 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:16:42.858000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:16:42.860000 audit[3688]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0acdc975 a2=241 a3=1b6 items=1 ppid=3631 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:42.860000 audit: CWD cwd="/etc/service/enabled/confd/log"
Oct  2 19:16:42.860000 audit: PATH item=0 name="/dev/fd/63" inode=30526 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:16:42.860000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:16:42.878000 audit[3682]: AVC avc:  denied  { write } for  pid=3682 comm="tee" name="fd" dev="proc" ino=30556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:16:42.881000 audit[3695]: AVC avc:  denied  { write } for  pid=3695 comm="tee" name="fd" dev="proc" ino=30559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:16:42.878000 audit[3682]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9db95975 a2=241 a3=1b6 items=1 ppid=3627 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:42.878000 audit: CWD cwd="/etc/service/enabled/felix/log"
Oct  2 19:16:42.878000 audit: PATH item=0 name="/dev/fd/63" inode=30523 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:16:42.878000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:16:42.881000 audit[3695]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd86dd1977 a2=241 a3=1b6 items=1 ppid=3635 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:42.881000 audit: CWD cwd="/etc/service/enabled/cni/log"
Oct  2 19:16:42.881000 audit: PATH item=0 name="/dev/fd/63" inode=30540 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:16:42.881000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:16:42.890000 audit[3705]: AVC avc:  denied  { write } for  pid=3705 comm="tee" name="fd" dev="proc" ino=30564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:16:42.890000 audit[3705]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff68060965 a2=241 a3=1b6 items=1 ppid=3642 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:42.890000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Oct  2 19:16:42.890000 audit: PATH item=0 name="/dev/fd/63" inode=30553 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:16:42.890000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:16:43.300230 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.OHbAZt.mount: Deactivated successfully.
Oct  2 19:16:43.327000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.327000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.327000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.327000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.327000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.327000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.327000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.327000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.327000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.327000 audit: BPF prog-id=143 op=LOAD
Oct  2 19:16:43.327000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf332a480 a2=70 a3=7f2658eb9000 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:16:43.342000 audit: BPF prog-id=143 op=UNLOAD
Oct  2 19:16:43.342000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.342000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.342000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.342000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.342000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.342000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.342000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.342000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.342000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.342000 audit: BPF prog-id=144 op=LOAD
Oct  2 19:16:43.342000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf332a480 a2=70 a3=6e items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:16:43.343000 audit: BPF prog-id=144 op=UNLOAD
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdf332a430 a2=70 a3=7ffdf332a480 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.343000 audit: BPF prog-id=145 op=LOAD
Oct  2 19:16:43.343000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdf332a410 a2=70 a3=7ffdf332a480 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:16:43.344000 audit: BPF prog-id=145 op=UNLOAD
Oct  2 19:16:43.344000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.344000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf332a4f0 a2=70 a3=0 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:16:43.344000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.344000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf332a4e0 a2=70 a3=0 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:16:43.345000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.345000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdf332a520 a2=70 a3=0 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { perfmon } for  pid=3785 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit[3785]: AVC avc:  denied  { bpf } for  pid=3785 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.346000 audit: BPF prog-id=146 op=LOAD
Oct  2 19:16:43.346000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdf332a440 a2=70 a3=ffffffff items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.346000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:16:43.350000 audit[3796]: AVC avc:  denied  { bpf } for  pid=3796 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.350000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2fb043d0 a2=70 a3=fff80800 items=0 ppid=3629 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.350000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 19:16:43.350000 audit[3796]: AVC avc:  denied  { bpf } for  pid=3796 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:43.350000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2fb042a0 a2=70 a3=3 items=0 ppid=3629 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.350000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 19:16:43.357000 audit: BPF prog-id=146 op=UNLOAD
Oct  2 19:16:43.555000 audit[3818]: NETFILTER_CFG table=raw:115 family=2 entries=19 op=nft_register_chain pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:43.555000 audit[3818]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd07216120 a2=0 a3=7ffd0721610c items=0 ppid=3629 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.555000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:43.567000 audit[3819]: NETFILTER_CFG table=nat:116 family=2 entries=16 op=nft_register_chain pid=3819 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:43.567000 audit[3819]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffcd6ae3920 a2=0 a3=7ffcd6ae390c items=0 ppid=3629 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.567000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:43.571000 audit[3822]: NETFILTER_CFG table=mangle:117 family=2 entries=19 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:43.571000 audit[3822]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffea7bd4bc0 a2=0 a3=7ffea7bd4bac items=0 ppid=3629 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.571000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:43.640000 audit[3820]: NETFILTER_CFG table=filter:118 family=2 entries=39 op=nft_register_chain pid=3820 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:43.640000 audit[3820]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc52a27f10 a2=0 a3=55da8aad9000 items=0 ppid=3629 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:43.640000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:44.186119 systemd-networkd[1452]: vxlan.calico: Link UP
Oct  2 19:16:44.186128 systemd-networkd[1452]: vxlan.calico: Gained carrier
Oct  2 19:16:45.393161 systemd-networkd[1452]: vxlan.calico: Gained IPv6LL
Oct  2 19:16:47.133615 env[1311]: time="2023-10-02T19:16:47.133565645Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\""
Oct  2 19:16:47.134639 env[1311]: time="2023-10-02T19:16:47.133849348Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\""
Oct  2 19:16:47.208015 kubelet[2467]: I1002 19:16:47.207974    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-hl64d" podStartSLOduration=-9.223372001646866e+09 pod.CreationTimestamp="2023-10-02 19:16:12 +0000 UTC" firstStartedPulling="2023-10-02 19:16:13.388129586 +0000 UTC m=+19.503311327" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:41.279083304 +0000 UTC m=+47.394265045" watchObservedRunningTime="2023-10-02 19:16:47.207909803 +0000 UTC m=+53.323091544"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.208 [INFO][3877] k8s.go 576: Cleaning up netns ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns="/var/run/netns/cni-aa6d8d3b-084e-bbb0-266b-0b2248330a0d"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns="/var/run/netns/cni-aa6d8d3b-084e-bbb0-266b-0b2248330a0d"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns="/var/run/netns/cni-aa6d8d3b-084e-bbb0-266b-0b2248330a0d"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] k8s.go 583: Releasing IP address(es) ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] utils.go 196: Calico CNI releasing IP address ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.257 [INFO][3889] ipam_plugin.go 416: Releasing address using handleID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.275095 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:47.275095 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.267 [WARNING][3889] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.267 [INFO][3889] ipam_plugin.go 444: Releasing address using workloadID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.275095 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.270 [INFO][3877] k8s.go 589: Teardown processing complete. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:47.279053 systemd[1]: run-netns-cni\x2daa6d8d3b\x2d084e\x2dbbb0\x2d266b\x2d0b2248330a0d.mount: Deactivated successfully.
Oct  2 19:16:47.282093 env[1311]: time="2023-10-02T19:16:47.282051760Z" level=info msg="TearDown network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" successfully"
Oct  2 19:16:47.282236 env[1311]: time="2023-10-02T19:16:47.282216062Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" returns successfully"
Oct  2 19:16:47.283010 env[1311]: time="2023-10-02T19:16:47.282976572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9tz2t,Uid:cf67d82a-6eeb-4bf3-adec-800e8c7dc360,Namespace:kube-system,Attempt:1,}"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] k8s.go 576: Cleaning up netns ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns="/var/run/netns/cni-322b3501-ddc2-72f1-819d-b84733c630f5"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns="/var/run/netns/cni-322b3501-ddc2-72f1-819d-b84733c630f5"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns="/var/run/netns/cni-322b3501-ddc2-72f1-819d-b84733c630f5"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] k8s.go 583: Releasing IP address(es) ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.264 [INFO][3882] utils.go 196: Calico CNI releasing IP address ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.307 [INFO][3896] ipam_plugin.go 416: Releasing address using handleID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.328760 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:47.328760 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.317 [WARNING][3896] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.317 [INFO][3896] ipam_plugin.go 444: Releasing address using workloadID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.328760 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.321 [INFO][3882] k8s.go 589: Teardown processing complete. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:47.331237 systemd[1]: run-netns-cni\x2d322b3501\x2dddc2\x2d72f1\x2d819d\x2db84733c630f5.mount: Deactivated successfully.
Oct  2 19:16:47.332415 env[1311]: time="2023-10-02T19:16:47.332363909Z" level=info msg="TearDown network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" successfully"
Oct  2 19:16:47.332537 env[1311]: time="2023-10-02T19:16:47.332413909Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" returns successfully"
Oct  2 19:16:47.333317 env[1311]: time="2023-10-02T19:16:47.333281120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-484pr,Uid:51cdf950-fd56-4099-b416-942f3ef06aee,Namespace:calico-system,Attempt:1,}"
Oct  2 19:16:47.548505 systemd-networkd[1452]: calie3e9f3171ab: Link UP
Oct  2 19:16:47.554965 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie3e9f3171ab: link becomes ready
Oct  2 19:16:47.556316 systemd-networkd[1452]: calie3e9f3171ab: Gained carrier
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.412 [INFO][3902] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0 coredns-787d4945fb- kube-system  cf67d82a-6eeb-4bf3-adec-800e8c7dc360 694 0 2023-10-02 19:16:07 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] []  []} {k8s  ci-3510.3.0-a-e4b0ec5c33  coredns-787d4945fb-9tz2t eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] calie3e9f3171ab  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.412 [INFO][3902] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.473 [INFO][3923] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" HandleID="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.491 [INFO][3923] ipam_plugin.go 269: Auto assigning IP ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" HandleID="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042e0a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"coredns-787d4945fb-9tz2t", "timestamp":"2023-10-02 19:16:47.473434528 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:16:47.580618 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:47.580618 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.491 [INFO][3923] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33'
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.493 [INFO][3923] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.501 [INFO][3923] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.514 [INFO][3923] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.516 [INFO][3923] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.518 [INFO][3923] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.518 [INFO][3923] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.522 [INFO][3923] ipam.go 1682: Creating new handle: k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.525 [INFO][3923] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.531 [INFO][3923] ipam.go 1216: Successfully claimed IPs: [192.168.25.193/26] block=192.168.25.192/26 handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.531 [INFO][3923] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.193/26] handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.580618 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.531 [INFO][3923] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.193/26] IPv6=[] ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" HandleID="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.536 [INFO][3902] k8s.go 383: Populated endpoint ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"cf67d82a-6eeb-4bf3-adec-800e8c7dc360", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"coredns-787d4945fb-9tz2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3e9f3171ab", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.536 [INFO][3902] k8s.go 384: Calico CNI using IPs: [192.168.25.193/32] ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.536 [INFO][3902] dataplane_linux.go 68: Setting the host side veth name to calie3e9f3171ab ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.537 [INFO][3902] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.557 [INFO][3902] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"cf67d82a-6eeb-4bf3-adec-800e8c7dc360", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b", Pod:"coredns-787d4945fb-9tz2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3e9f3171ab", MAC:"da:0d:97:b1:d1:83", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.575 [INFO][3902] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:47.617970 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali307092f28d3: link becomes ready
Oct  2 19:16:47.625783 systemd-networkd[1452]: cali307092f28d3: Link UP
Oct  2 19:16:47.625792 systemd-networkd[1452]: cali307092f28d3: Gained carrier
Oct  2 19:16:47.649318 env[1311]: time="2023-10-02T19:16:47.649110494Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:47.649318 env[1311]: time="2023-10-02T19:16:47.649167794Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:47.649318 env[1311]: time="2023-10-02T19:16:47.649181695Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:47.650477 env[1311]: time="2023-10-02T19:16:47.649662501Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b pid=3967 runtime=io.containerd.runc.v2
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.465 [INFO][3912] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0 csi-node-driver- calico-system  51cdf950-fd56-4099-b416-942f3ef06aee 695 0 2023-10-02 19:16:32 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5877dcb8f5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] []  []} {k8s  ci-3510.3.0-a-e4b0ec5c33  csi-node-driver-484pr eth0 default [] []   [kns.calico-system ksa.calico-system.default] cali307092f28d3  [] []}} ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.465 [INFO][3912] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.517 [INFO][3933] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" HandleID="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.529 [INFO][3933] ipam_plugin.go 269: Auto assigning IP ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" HandleID="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d660), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"csi-node-driver-484pr", "timestamp":"2023-10-02 19:16:47.517576497 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:16:47.650477 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:47.650477 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.531 [INFO][3933] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33'
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.540 [INFO][3933] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.558 [INFO][3933] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.582 [INFO][3933] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.586 [INFO][3933] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.589 [INFO][3933] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.589 [INFO][3933] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.591 [INFO][3933] ipam.go 1682: Creating new handle: k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.598 [INFO][3933] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.607 [INFO][3933] ipam.go 1216: Successfully claimed IPs: [192.168.25.194/26] block=192.168.25.192/26 handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.607 [INFO][3933] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.194/26] handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:47.650477 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.607 [INFO][3933] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.194/26] IPv6=[] ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" HandleID="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.608 [INFO][3912] k8s.go 383: Populated endpoint ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51cdf950-fd56-4099-b416-942f3ef06aee", ResourceVersion:"695", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"csi-node-driver-484pr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali307092f28d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.609 [INFO][3912] k8s.go 384: Calico CNI using IPs: [192.168.25.194/32] ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.609 [INFO][3912] dataplane_linux.go 68: Setting the host side veth name to cali307092f28d3 ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.617 [INFO][3912] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.625 [INFO][3912] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51cdf950-fd56-4099-b416-942f3ef06aee", ResourceVersion:"695", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a", Pod:"csi-node-driver-484pr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali307092f28d3", MAC:"a2:1b:00:f3:78:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.649 [INFO][3912] k8s.go 489: Wrote updated endpoint to datastore ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:47.673655 kernel: kauditd_printk_skb: 151 callbacks suppressed
Oct  2 19:16:47.673794 kernel: audit: type=1325 audit(1696274207.655:1158): table=filter:119 family=2 entries=36 op=nft_register_chain pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:47.655000 audit[3973]: NETFILTER_CFG table=filter:119 family=2 entries=36 op=nft_register_chain pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:47.655000 audit[3973]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd136fd800 a2=0 a3=7ffd136fd7ec items=0 ppid=3629 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.700273 kernel: audit: type=1300 audit(1696274207.655:1158): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd136fd800 a2=0 a3=7ffd136fd7ec items=0 ppid=3629 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.655000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:47.715155 kernel: audit: type=1327 audit(1696274207.655:1158): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:47.715214 kernel: audit: type=1325 audit(1696274207.708:1159): table=filter:120 family=2 entries=40 op=nft_register_chain pid=3999 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:47.708000 audit[3999]: NETFILTER_CFG table=filter:120 family=2 entries=40 op=nft_register_chain pid=3999 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:47.714954 systemd[1]: Started cri-containerd-c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b.scope.
Oct  2 19:16:47.708000 audit[3999]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff07841610 a2=0 a3=7fff078415fc items=0 ppid=3629 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.736219 env[1311]: time="2023-10-02T19:16:47.734146590Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:47.736219 env[1311]: time="2023-10-02T19:16:47.734205391Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:47.736219 env[1311]: time="2023-10-02T19:16:47.734227091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:47.736219 env[1311]: time="2023-10-02T19:16:47.734343993Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a pid=4015 runtime=io.containerd.runc.v2
Oct  2 19:16:47.748653 kernel: audit: type=1300 audit(1696274207.708:1159): arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff07841610 a2=0 a3=7fff078415fc items=0 ppid=3629 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.708000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:47.768039 kernel: audit: type=1327 audit(1696274207.708:1159): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.782974 kernel: audit: type=1400 audit(1696274207.750:1160): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.783063 kernel: audit: type=1400 audit(1696274207.750:1161): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.812037 kernel: audit: type=1400 audit(1696274207.750:1162): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.812517 systemd[1]: Started cri-containerd-50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a.scope.
Oct  2 19:16:47.827000 kernel: audit: type=1400 audit(1696274207.750:1163): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit: BPF prog-id=147 op=LOAD
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.751000 audit: BPF prog-id=148 op=LOAD
Oct  2 19:16:47.751000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002809b0 items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit: BPF prog-id=149 op=LOAD
Oct  2 19:16:47.752000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002809f8 items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536
Oct  2 19:16:47.752000 audit: BPF prog-id=149 op=UNLOAD
Oct  2 19:16:47.752000 audit: BPF prog-id=148 op=UNLOAD
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { perfmon } for  pid=3982 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit[3982]: AVC avc:  denied  { bpf } for  pid=3982 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.752000 audit: BPF prog-id=150 op=LOAD
Oct  2 19:16:47.752000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000280e08 items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.845000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.846000 audit: BPF prog-id=151 op=LOAD
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.847000 audit: BPF prog-id=152 op=LOAD
Oct  2 19:16:47.847000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001ddc90 items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339
Oct  2 19:16:47.848000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.848000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.848000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.848000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.848000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.848000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.848000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.848000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.848000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.848000 audit: BPF prog-id=153 op=LOAD
Oct  2 19:16:47.848000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001ddcd8 items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339
Oct  2 19:16:47.849000 audit: BPF prog-id=153 op=UNLOAD
Oct  2 19:16:47.849000 audit: BPF prog-id=152 op=UNLOAD
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { perfmon } for  pid=4023 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit[4023]: AVC avc:  denied  { bpf } for  pid=4023 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.849000 audit: BPF prog-id=154 op=LOAD
Oct  2 19:16:47.849000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029e0e8 items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339
Oct  2 19:16:47.861463 env[1311]: time="2023-10-02T19:16:47.861423232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9tz2t,Uid:cf67d82a-6eeb-4bf3-adec-800e8c7dc360,Namespace:kube-system,Attempt:1,} returns sandbox id \"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b\""
Oct  2 19:16:47.864567 env[1311]: time="2023-10-02T19:16:47.864530672Z" level=info msg="CreateContainer within sandbox \"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Oct  2 19:16:47.871678 env[1311]: time="2023-10-02T19:16:47.871633764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-484pr,Uid:51cdf950-fd56-4099-b416-942f3ef06aee,Namespace:calico-system,Attempt:1,} returns sandbox id \"50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a\""
Oct  2 19:16:47.873291 env[1311]: time="2023-10-02T19:16:47.873261585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 19:16:47.902464 env[1311]: time="2023-10-02T19:16:47.902387160Z" level=info msg="CreateContainer within sandbox \"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d54976f15c945c8972d1bf41fe51acbd750ed4acc65c1d60d4cc153882188abf\""
Oct  2 19:16:47.904721 env[1311]: time="2023-10-02T19:16:47.903518175Z" level=info msg="StartContainer for \"d54976f15c945c8972d1bf41fe51acbd750ed4acc65c1d60d4cc153882188abf\""
Oct  2 19:16:47.920691 systemd[1]: Started cri-containerd-d54976f15c945c8972d1bf41fe51acbd750ed4acc65c1d60d4cc153882188abf.scope.
Oct  2 19:16:47.934000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.934000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.934000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.934000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.934000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.934000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.934000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.934000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.934000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.935000 audit: BPF prog-id=155 op=LOAD
Oct  2 19:16:47.935000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.935000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161
Oct  2 19:16:47.935000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.935000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit: BPF prog-id=156 op=LOAD
Oct  2 19:16:47.936000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00026b720 items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.936000 audit: BPF prog-id=157 op=LOAD
Oct  2 19:16:47.936000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00026b768 items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161
Oct  2 19:16:47.937000 audit: BPF prog-id=157 op=UNLOAD
Oct  2 19:16:47.937000 audit: BPF prog-id=156 op=UNLOAD
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { perfmon } for  pid=4062 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit[4062]: AVC avc:  denied  { bpf } for  pid=4062 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:47.937000 audit: BPF prog-id=158 op=LOAD
Oct  2 19:16:47.937000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00026bb78 items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:47.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161
Oct  2 19:16:47.956192 env[1311]: time="2023-10-02T19:16:47.956147253Z" level=info msg="StartContainer for \"d54976f15c945c8972d1bf41fe51acbd750ed4acc65c1d60d4cc153882188abf\" returns successfully"
Oct  2 19:16:48.135335 env[1311]: time="2023-10-02T19:16:48.135297141Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\""
Oct  2 19:16:48.178583 env[1311]: time="2023-10-02T19:16:48.178521592Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:16:48.184069 env[1311]: time="2023-10-02T19:16:48.184016262Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:16:48.184514 kubelet[2467]: E1002 19:16:48.184485    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:16:48.184625 kubelet[2467]: E1002 19:16:48.184541    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:16:48.184725 kubelet[2467]: E1002 19:16:48.184690    2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:16:48.185783 env[1311]: time="2023-10-02T19:16:48.185756484Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] k8s.go 576: Cleaning up netns ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns="/var/run/netns/cni-e04acd40-825c-b5b6-0fca-f962179d0fc3"
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns="/var/run/netns/cni-e04acd40-825c-b5b6-0fca-f962179d0fc3"
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns="/var/run/netns/cni-e04acd40-825c-b5b6-0fca-f962179d0fc3"
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] k8s.go 583: Releasing IP address(es) ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] utils.go 196: Calico CNI releasing IP address ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.209 [INFO][4114] ipam_plugin.go 416: Releasing address using handleID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.217864 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:48.217864 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.214 [WARNING][4114] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.214 [INFO][4114] ipam_plugin.go 444: Releasing address using workloadID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.217864 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.216 [INFO][4107] k8s.go 589: Teardown processing complete. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:48.219000 env[1311]: time="2023-10-02T19:16:48.218922806Z" level=info msg="TearDown network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" successfully"
Oct  2 19:16:48.219000 env[1311]: time="2023-10-02T19:16:48.218996207Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" returns successfully"
Oct  2 19:16:48.219547 env[1311]: time="2023-10-02T19:16:48.219518313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mdww6,Uid:6efed0db-4734-47a7-afef-8e4f010b2a81,Namespace:kube-system,Attempt:1,}"
Oct  2 19:16:48.283701 systemd[1]: run-netns-cni\x2de04acd40\x2d825c\x2db5b6\x2d0fca\x2df962179d0fc3.mount: Deactivated successfully.
Oct  2 19:16:48.330913 kubelet[2467]: I1002 19:16:48.330872    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-9tz2t" podStartSLOduration=41.33082973 pod.CreationTimestamp="2023-10-02 19:16:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:48.303038777 +0000 UTC m=+54.418220518" watchObservedRunningTime="2023-10-02 19:16:48.33082973 +0000 UTC m=+54.446011571"
Oct  2 19:16:48.393000 audit[4162]: NETFILTER_CFG table=filter:121 family=2 entries=12 op=nft_register_rule pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:48.393000 audit[4162]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fffec47cea0 a2=0 a3=7fffec47ce8c items=0 ppid=2658 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:48.394000 audit[4162]: NETFILTER_CFG table=nat:122 family=2 entries=30 op=nft_register_rule pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:48.394000 audit[4162]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fffec47cea0 a2=0 a3=7fffec47ce8c items=0 ppid=2658 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:48.455347 systemd-networkd[1452]: cali8901d5a0345: Link UP
Oct  2 19:16:48.455356 systemd-networkd[1452]: cali8901d5a0345: Gained carrier
Oct  2 19:16:48.461000 audit[4191]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:48.461000 audit[4191]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdfc3a5000 a2=0 a3=7ffdfc3a4fec items=0 ppid=2658 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:48.463000 audit[4191]: NETFILTER_CFG table=nat:124 family=2 entries=51 op=nft_register_chain pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:48.463000 audit[4191]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffdfc3a5000 a2=0 a3=7ffdfc3a4fec items=0 ppid=2658 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.333 [INFO][4121] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0 coredns-787d4945fb- kube-system  6efed0db-4734-47a7-afef-8e4f010b2a81 708 0 2023-10-02 19:16:07 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] []  []} {k8s  ci-3510.3.0-a-e4b0ec5c33  coredns-787d4945fb-mdww6 eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] cali8901d5a0345  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.334 [INFO][4121] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.400 [INFO][4144] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" HandleID="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.413 [INFO][4144] ipam_plugin.go 269: Auto assigning IP ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" HandleID="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000423f50), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"coredns-787d4945fb-mdww6", "timestamp":"2023-10-02 19:16:48.40072682 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:16:48.471451 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:48.471451 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.413 [INFO][4144] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33'
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.414 [INFO][4144] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.418 [INFO][4144] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.423 [INFO][4144] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.425 [INFO][4144] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.427 [INFO][4144] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.427 [INFO][4144] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.436 [INFO][4144] ipam.go 1682: Creating new handle: k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.440 [INFO][4144] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.445 [INFO][4144] ipam.go 1216: Successfully claimed IPs: [192.168.25.195/26] block=192.168.25.192/26 handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.445 [INFO][4144] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.195/26] handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:48.471451 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.446 [INFO][4144] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.195/26] IPv6=[] ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" HandleID="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.447 [INFO][4121] k8s.go 383: Populated endpoint ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6efed0db-4734-47a7-afef-8e4f010b2a81", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"coredns-787d4945fb-mdww6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8901d5a0345", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.448 [INFO][4121] k8s.go 384: Calico CNI using IPs: [192.168.25.195/32] ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.448 [INFO][4121] dataplane_linux.go 68: Setting the host side veth name to cali8901d5a0345 ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.449 [INFO][4121] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.453 [INFO][4121] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6efed0db-4734-47a7-afef-8e4f010b2a81", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552", Pod:"coredns-787d4945fb-mdww6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8901d5a0345", MAC:"72:75:2d:17:04:bd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.469 [INFO][4121] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:48.486397 env[1311]: time="2023-10-02T19:16:48.486351610Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:16:48.490214 env[1311]: time="2023-10-02T19:16:48.490169958Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:16:48.490634 kubelet[2467]: E1002 19:16:48.490595    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:16:48.490726 kubelet[2467]: E1002 19:16:48.490664    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:16:48.490821 kubelet[2467]: E1002 19:16:48.490803    2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:16:48.490952 kubelet[2467]: E1002 19:16:48.490898    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:16:48.496298 env[1311]: time="2023-10-02T19:16:48.496203835Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:48.496298 env[1311]: time="2023-10-02T19:16:48.496247836Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:48.496298 env[1311]: time="2023-10-02T19:16:48.496262936Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:48.496000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:48.496000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00239bda0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:16:48.496000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:16:48.498004 env[1311]: time="2023-10-02T19:16:48.496591540Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552 pid=4212 runtime=io.containerd.runc.v2
Oct  2 19:16:48.509000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:48.509000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002505360 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:16:48.509000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:16:48.510000 audit[4225]: NETFILTER_CFG table=filter:125 family=2 entries=34 op=nft_register_chain pid=4225 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:48.510000 audit[4225]: SYSCALL arch=c000003e syscall=46 success=yes exit=17900 a0=3 a1=7fff482c47a0 a2=0 a3=7fff482c478c items=0 ppid=3629 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.510000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:48.528716 systemd[1]: Started cri-containerd-e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552.scope.
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.539000 audit: BPF prog-id=159 op=LOAD
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit: BPF prog-id=160 op=LOAD
Oct  2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00039d7c0 items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit: BPF prog-id=161 op=LOAD
Oct  2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00039d808 items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337
Oct  2 19:16:48.540000 audit: BPF prog-id=161 op=UNLOAD
Oct  2 19:16:48.540000 audit: BPF prog-id=160 op=UNLOAD
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { perfmon } for  pid=4226 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit[4226]: AVC avc:  denied  { bpf } for  pid=4226 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.540000 audit: BPF prog-id=162 op=LOAD
Oct  2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00039dc18 items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337
Oct  2 19:16:48.569437 env[1311]: time="2023-10-02T19:16:48.569401367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mdww6,Uid:6efed0db-4734-47a7-afef-8e4f010b2a81,Namespace:kube-system,Attempt:1,} returns sandbox id \"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552\""
Oct  2 19:16:48.572339 env[1311]: time="2023-10-02T19:16:48.572301704Z" level=info msg="CreateContainer within sandbox \"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Oct  2 19:16:48.605517 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2957990756.mount: Deactivated successfully.
Oct  2 19:16:48.621178 env[1311]: time="2023-10-02T19:16:48.621131125Z" level=info msg="CreateContainer within sandbox \"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e2e2886ee9d5977fd1a614fb25400c4cac99fd6b928e759c359a6007882bcdf4\""
Oct  2 19:16:48.621887 env[1311]: time="2023-10-02T19:16:48.621846635Z" level=info msg="StartContainer for \"e2e2886ee9d5977fd1a614fb25400c4cac99fd6b928e759c359a6007882bcdf4\""
Oct  2 19:16:48.641303 systemd[1]: Started cri-containerd-e2e2886ee9d5977fd1a614fb25400c4cac99fd6b928e759c359a6007882bcdf4.scope.
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.654000 audit: BPF prog-id=163 op=LOAD
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.656000 audit: BPF prog-id=164 op=LOAD
Oct  2 19:16:48.656000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009ae60 items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit: BPF prog-id=165 op=LOAD
Oct  2 19:16:48.657000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009aea8 items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030
Oct  2 19:16:48.657000 audit: BPF prog-id=165 op=UNLOAD
Oct  2 19:16:48.657000 audit: BPF prog-id=164 op=UNLOAD
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { perfmon } for  pid=4257 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit[4257]: AVC avc:  denied  { bpf } for  pid=4257 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:48.657000 audit: BPF prog-id=166 op=LOAD
Oct  2 19:16:48.657000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b2b8 items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:48.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030
Oct  2 19:16:48.678707 env[1311]: time="2023-10-02T19:16:48.678629257Z" level=info msg="StartContainer for \"e2e2886ee9d5977fd1a614fb25400c4cac99fd6b928e759c359a6007882bcdf4\" returns successfully"
Oct  2 19:16:49.132717 env[1311]: time="2023-10-02T19:16:49.132668616Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\""
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] k8s.go 576: Cleaning up netns ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns="/var/run/netns/cni-235d608d-c5ed-42a3-bc7f-4122185f3fcd"
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns="/var/run/netns/cni-235d608d-c5ed-42a3-bc7f-4122185f3fcd"
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns="/var/run/netns/cni-235d608d-c5ed-42a3-bc7f-4122185f3fcd"
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] k8s.go 583: Releasing IP address(es) ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] utils.go 196: Calico CNI releasing IP address ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.192 [INFO][4308] ipam_plugin.go 416: Releasing address using handleID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.200097 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:49.200097 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.197 [WARNING][4308] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.197 [INFO][4308] ipam_plugin.go 444: Releasing address using workloadID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.200097 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.199 [INFO][4302] k8s.go 589: Teardown processing complete. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:49.200915 env[1311]: time="2023-10-02T19:16:49.200258165Z" level=info msg="TearDown network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" successfully"
Oct  2 19:16:49.200915 env[1311]: time="2023-10-02T19:16:49.200307866Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" returns successfully"
Oct  2 19:16:49.201317 env[1311]: time="2023-10-02T19:16:49.201283678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-z4r7k,Uid:51cd6516-73d5-4525-9aa3-c3b0c6013145,Namespace:calico-system,Attempt:1,}"
Oct  2 19:16:49.233167 systemd-networkd[1452]: cali307092f28d3: Gained IPv6LL
Oct  2 19:16:49.280057 systemd[1]: run-netns-cni\x2d235d608d\x2dc5ed\x2d42a3\x2dbc7f\x2d4122185f3fcd.mount: Deactivated successfully.
Oct  2 19:16:49.301386 kubelet[2467]: E1002 19:16:49.300549    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:16:49.351625 kubelet[2467]: I1002 19:16:49.351589    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-mdww6" podStartSLOduration=42.351551766 pod.CreationTimestamp="2023-10-02 19:16:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:49.334701955 +0000 UTC m=+55.449883696" watchObservedRunningTime="2023-10-02 19:16:49.351551766 +0000 UTC m=+55.466733507"
Oct  2 19:16:49.410028 systemd-networkd[1452]: caliaa057d8a91c: Link UP
Oct  2 19:16:49.410039 systemd-networkd[1452]: caliaa057d8a91c: Gained carrier
Oct  2 19:16:49.425265 systemd-networkd[1452]: calie3e9f3171ab: Gained IPv6LL
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.274 [INFO][4314] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0 calico-kube-controllers-69c848ddc6- calico-system  51cd6516-73d5-4525-9aa3-c3b0c6013145 731 0 2023-10-02 19:16:13 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69c848ddc6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] []  []} {k8s  ci-3510.3.0-a-e4b0ec5c33  calico-kube-controllers-69c848ddc6-z4r7k eth0 calico-kube-controllers [] []   [kns.calico-system ksa.calico-system.calico-kube-controllers] caliaa057d8a91c  [] []}} ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.274 [INFO][4314] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.342 [INFO][4326] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" HandleID="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.364 [INFO][4326] ipam_plugin.go 269: Auto assigning IP ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" HandleID="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00053a590), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"calico-kube-controllers-69c848ddc6-z4r7k", "timestamp":"2023-10-02 19:16:49.341972846 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:16:49.430903 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:49.430903 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.364 [INFO][4326] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33'
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.375 [INFO][4326] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.384 [INFO][4326] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.387 [INFO][4326] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.389 [INFO][4326] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.391 [INFO][4326] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.391 [INFO][4326] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.392 [INFO][4326] ipam.go 1682: Creating new handle: k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.396 [INFO][4326] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.402 [INFO][4326] ipam.go 1216: Successfully claimed IPs: [192.168.25.196/26] block=192.168.25.192/26 handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.402 [INFO][4326] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.196/26] handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:49.430903 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.402 [INFO][4326] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.196/26] IPv6=[] ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" HandleID="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.403 [INFO][4314] k8s.go 383: Populated endpoint ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"51cd6516-73d5-4525-9aa3-c3b0c6013145", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"calico-kube-controllers-69c848ddc6-z4r7k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa057d8a91c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.403 [INFO][4314] k8s.go 384: Calico CNI using IPs: [192.168.25.196/32] ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.403 [INFO][4314] dataplane_linux.go 68: Setting the host side veth name to caliaa057d8a91c ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.404 [INFO][4314] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.408 [INFO][4314] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"51cd6516-73d5-4525-9aa3-c3b0c6013145", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67", Pod:"calico-kube-controllers-69c848ddc6-z4r7k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa057d8a91c", MAC:"9a:79:8d:36:8b:38", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.429 [INFO][4314] k8s.go 489: Wrote updated endpoint to datastore ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:49.445000 audit[4369]: NETFILTER_CFG table=filter:126 family=2 entries=6 op=nft_register_rule pid=4369 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:49.445000 audit[4369]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdce00ef10 a2=0 a3=7ffdce00eefc items=0 ppid=2658 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:49.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:49.453425 env[1311]: time="2023-10-02T19:16:49.453373946Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:49.453579 env[1311]: time="2023-10-02T19:16:49.453557348Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:49.453686 env[1311]: time="2023-10-02T19:16:49.453668150Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:49.453913 env[1311]: time="2023-10-02T19:16:49.453887352Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67 pid=4377 runtime=io.containerd.runc.v2
Oct  2 19:16:49.454000 audit[4369]: NETFILTER_CFG table=nat:127 family=2 entries=60 op=nft_register_rule pid=4369 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:49.454000 audit[4369]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffdce00ef10 a2=0 a3=7ffdce00eefc items=0 ppid=2658 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:49.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:49.482514 systemd[1]: run-containerd-runc-k8s.io-9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67-runc.dEnO34.mount: Deactivated successfully.
Oct  2 19:16:49.489022 systemd[1]: Started cri-containerd-9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67.scope.
Oct  2 19:16:49.504000 audit[4406]: NETFILTER_CFG table=filter:128 family=2 entries=42 op=nft_register_chain pid=4406 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:49.504000 audit[4406]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffdab980660 a2=0 a3=7ffdab98064c items=0 ppid=3629 pid=4406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:49.504000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:49.507000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.507000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.507000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.507000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.507000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.507000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.507000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.507000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.507000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit: BPF prog-id=167 op=LOAD
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit: BPF prog-id=168 op=LOAD
Oct  2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003dc6f0 items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit: BPF prog-id=169 op=LOAD
Oct  2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003dc738 items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438
Oct  2 19:16:49.508000 audit: BPF prog-id=169 op=UNLOAD
Oct  2 19:16:49.508000 audit: BPF prog-id=168 op=UNLOAD
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { perfmon } for  pid=4386 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit[4386]: AVC avc:  denied  { bpf } for  pid=4386 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:49.508000 audit: BPF prog-id=170 op=LOAD
Oct  2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003dcb48 items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438
Oct  2 19:16:49.542237 env[1311]: time="2023-10-02T19:16:49.542192762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-z4r7k,Uid:51cd6516-73d5-4525-9aa3-c3b0c6013145,Namespace:calico-system,Attempt:1,} returns sandbox id \"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67\""
Oct  2 19:16:49.543799 env[1311]: time="2023-10-02T19:16:49.543773682Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\""
Oct  2 19:16:50.129187 systemd-networkd[1452]: cali8901d5a0345: Gained IPv6LL
Oct  2 19:16:50.459000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:50.459000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011b99620 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:16:50.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:16:50.481000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:50.481000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00c18be90 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:16:50.481000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:16:50.493000 audit[4439]: NETFILTER_CFG table=filter:129 family=2 entries=6 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:50.493000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffea5bfc080 a2=0 a3=7ffea5bfc06c items=0 ppid=2658 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:50.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:50.498000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:50.498000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:50.498000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0022737c0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:16:50.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:16:50.498000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c010a86030 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:16:50.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:16:50.513130 systemd-networkd[1452]: caliaa057d8a91c: Gained IPv6LL
Oct  2 19:16:50.526000 audit[4439]: NETFILTER_CFG table=nat:130 family=2 entries=72 op=nft_register_chain pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:50.526000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffea5bfc080 a2=0 a3=7ffea5bfc06c items=0 ppid=2658 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:50.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:50.551000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:50.551000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:50.551000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c010a860c0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:16:50.551000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:16:50.551000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c002273dc0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:16:50.551000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:16:51.930447 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2763622732.mount: Deactivated successfully.
Oct  2 19:16:53.071092 update_engine[1291]: I1002 19:16:53.071048  1291 prefs.cc:51] certificate-report-to-send-update not present in /var/lib/update_engine/prefs
Oct  2 19:16:53.071092 update_engine[1291]: I1002 19:16:53.071091  1291 prefs.cc:51] certificate-report-to-send-download not present in /var/lib/update_engine/prefs
Oct  2 19:16:53.071865 update_engine[1291]: I1002 19:16:53.071223  1291 prefs.cc:51] aleph-version not present in /var/lib/update_engine/prefs
Oct  2 19:16:53.071865 update_engine[1291]: I1002 19:16:53.071733  1291 omaha_request_params.cc:62] Current group set to lts
Oct  2 19:16:53.072027 update_engine[1291]: I1002 19:16:53.071924  1291 update_attempter.cc:495] Already updated boot flags. Skipping.
Oct  2 19:16:53.072027 update_engine[1291]: I1002 19:16:53.071934  1291 update_attempter.cc:638] Scheduling an action processor start.
Oct  2 19:16:53.072027 update_engine[1291]: I1002 19:16:53.071969  1291 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction
Oct  2 19:16:53.072027 update_engine[1291]: I1002 19:16:53.072001  1291 prefs.cc:51] previous-version not present in /var/lib/update_engine/prefs
Oct  2 19:16:53.072181 update_engine[1291]: I1002 19:16:53.072068  1291 omaha_request_action.cc:268] Posting an Omaha request to https://public.update.flatcar-linux.net/v1/update/
Oct  2 19:16:53.072181 update_engine[1291]: I1002 19:16:53.072075  1291 omaha_request_action.cc:269] Request: <?xml version="1.0" encoding="UTF-8"?>
Oct  2 19:16:53.072181 update_engine[1291]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1">
Oct  2 19:16:53.072181 update_engine[1291]:     <os version="Chateau" platform="CoreOS" sp="3510.3.0_x86_64"></os>
Oct  2 19:16:53.072181 update_engine[1291]:     <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3510.3.0" track="lts" bootid="{f6c5ec29-90b4-41ac-a988-84d2a9e7b5da}" oem="azure" oemversion="2.6.0.2-r1" alephversion="3510.3.0" machineid="fbdf4143f308436287d96f9ed77da498" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" >
Oct  2 19:16:53.072181 update_engine[1291]:         <ping active="1"></ping>
Oct  2 19:16:53.072181 update_engine[1291]:         <updatecheck></updatecheck>
Oct  2 19:16:53.072181 update_engine[1291]:         <event eventtype="3" eventresult="2" previousversion="0.0.0.0"></event>
Oct  2 19:16:53.072181 update_engine[1291]:     </app>
Oct  2 19:16:53.072181 update_engine[1291]: </request>
Oct  2 19:16:53.072181 update_engine[1291]: I1002 19:16:53.072081  1291 libcurl_http_fetcher.cc:47] Starting/Resuming transfer
Oct  2 19:16:53.073472 locksmithd[1385]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0
Oct  2 19:16:53.074143 update_engine[1291]: I1002 19:16:53.074124  1291 libcurl_http_fetcher.cc:174] Setting up curl options for HTTPS
Oct  2 19:16:53.074443 update_engine[1291]: I1002 19:16:53.074426  1291 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds.
Oct  2 19:16:53.303652 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.jlDR0a.mount: Deactivated successfully.
Oct  2 19:16:53.602000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:53.606867 kernel: kauditd_printk_skb: 392 callbacks suppressed
Oct  2 19:16:53.606979 kernel: audit: type=1400 audit(1696274213.602:1287): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:53.602000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:53.642617 kernel: audit: type=1400 audit(1696274213.602:1286): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:53.602000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832bc0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:16:53.663894 kernel: audit: type=1300 audit(1696274213.602:1287): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832bc0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:16:53.602000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:16:53.603000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:53.698490 kernel: audit: type=1327 audit(1696274213.602:1287): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:16:53.698584 kernel: audit: type=1400 audit(1696274213.603:1288): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:53.698608 kernel: audit: type=1300 audit(1696274213.603:1288): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832de0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:16:53.603000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832de0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:16:53.603000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:16:53.740185 kernel: audit: type=1327 audit(1696274213.603:1288): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:16:53.603000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:53.756631 kernel: audit: type=1400 audit(1696274213.603:1289): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:16:53.756716 kernel: audit: type=1300 audit(1696274213.603:1289): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832e00 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:16:53.603000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832e00 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:16:53.603000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:16:53.795711 kernel: audit: type=1327 audit(1696274213.603:1289): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:16:53.602000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002964000 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:16:53.602000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:16:54.013131 env[1311]: time="2023-10-02T19:16:54.013086803Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\""
Oct  2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.122 [WARNING][4492] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"cf67d82a-6eeb-4bf3-adec-800e8c7dc360", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b", Pod:"coredns-787d4945fb-9tz2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3e9f3171ab", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.123 [INFO][4492] k8s.go 576: Cleaning up netns ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.123 [INFO][4492] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns=""
Oct  2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.123 [INFO][4492] k8s.go 583: Releasing IP address(es) ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.123 [INFO][4492] utils.go 196: Calico CNI releasing IP address ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.170 [INFO][4499] ipam_plugin.go 416: Releasing address using handleID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:54.183990 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:54.183990 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.179 [WARNING][4499] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.179 [INFO][4499] ipam_plugin.go 444: Releasing address using workloadID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:54.183990 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.182 [INFO][4492] k8s.go 589: Teardown processing complete. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:54.187042 update_engine[1291]: I1002 19:16:54.186486  1291 prefs.cc:51] update-server-cert-0-2 not present in /var/lib/update_engine/prefs
Oct  2 19:16:54.187042 update_engine[1291]: I1002 19:16:54.186725  1291 prefs.cc:51] update-server-cert-0-1 not present in /var/lib/update_engine/prefs
Oct  2 19:16:54.187042 update_engine[1291]: I1002 19:16:54.186877  1291 prefs.cc:51] update-server-cert-0-0 not present in /var/lib/update_engine/prefs
Oct  2 19:16:54.188312 env[1311]: time="2023-10-02T19:16:54.188267075Z" level=info msg="TearDown network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" successfully"
Oct  2 19:16:54.188438 env[1311]: time="2023-10-02T19:16:54.188419077Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" returns successfully"
Oct  2 19:16:54.189217 env[1311]: time="2023-10-02T19:16:54.189187386Z" level=info msg="RemovePodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\""
Oct  2 19:16:54.189383 env[1311]: time="2023-10-02T19:16:54.189337387Z" level=info msg="Forcibly stopping sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\""
Oct  2 19:16:54.276465 update_engine[1291]: I1002 19:16:54.275637  1291 libcurl_http_fetcher.cc:263] HTTP response code: 200
Oct  2 19:16:54.278616 update_engine[1291]: I1002 19:16:54.278515  1291 libcurl_http_fetcher.cc:320] Transfer completed (200), 314 bytes downloaded
Oct  2 19:16:54.278829 update_engine[1291]: I1002 19:16:54.278540  1291 omaha_request_action.cc:619] Omaha request response: <?xml version="1.0" encoding="UTF-8"?>
Oct  2 19:16:54.278829 update_engine[1291]: <response protocol="3.0" server="nebraska"><daystart elapsed_seconds="0"></daystart><app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" status="ok"><ping status="ok"></ping><updatecheck status="noupdate"><urls></urls></updatecheck><event status="ok"></event></app></response>
Oct  2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.282 [WARNING][4521] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"cf67d82a-6eeb-4bf3-adec-800e8c7dc360", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b", Pod:"coredns-787d4945fb-9tz2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3e9f3171ab", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.282 [INFO][4521] k8s.go 576: Cleaning up netns ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.283 [INFO][4521] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns=""
Oct  2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.283 [INFO][4521] k8s.go 583: Releasing IP address(es) ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.283 [INFO][4521] utils.go 196: Calico CNI releasing IP address ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.335 [INFO][4527] ipam_plugin.go 416: Releasing address using handleID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:54.350147 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:54.350147 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.343 [WARNING][4527] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.343 [INFO][4527] ipam_plugin.go 444: Releasing address using workloadID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0"
Oct  2 19:16:54.350147 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.348 [INFO][4521] k8s.go 589: Teardown processing complete. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e"
Oct  2 19:16:54.350808 env[1311]: time="2023-10-02T19:16:54.350190189Z" level=info msg="TearDown network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" successfully"
Oct  2 19:16:54.360910 env[1311]: time="2023-10-02T19:16:54.360860616Z" level=info msg="RemovePodSandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" returns successfully"
Oct  2 19:16:54.361556 env[1311]: time="2023-10-02T19:16:54.361518223Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\""
Oct  2 19:16:54.370030 update_engine[1291]: I1002 19:16:54.369988  1291 omaha_request_action.cc:409] No update.
Oct  2 19:16:54.370030 update_engine[1291]: I1002 19:16:54.370026  1291 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction
Oct  2 19:16:54.370030 update_engine[1291]: I1002 19:16:54.370033  1291 omaha_response_handler_action.cc:36] There are no updates. Aborting.
Oct  2 19:16:54.370030 update_engine[1291]: I1002 19:16:54.370038  1291 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaResponseHandlerAction action failed. Aborting processing.
Oct  2 19:16:54.370262 update_engine[1291]: I1002 19:16:54.370043  1291 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaResponseHandlerAction
Oct  2 19:16:54.370262 update_engine[1291]: I1002 19:16:54.370045  1291 update_attempter.cc:302] Processing Done.
Oct  2 19:16:54.370262 update_engine[1291]: I1002 19:16:54.370064  1291 update_attempter.cc:338] No update.
Oct  2 19:16:54.370262 update_engine[1291]: I1002 19:16:54.370079  1291 update_check_scheduler.cc:74] Next update check in 48m42s
Oct  2 19:16:54.370744 locksmithd[1385]: LastCheckedTime=1696274214 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0
Oct  2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [WARNING][4548] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51cdf950-fd56-4099-b416-942f3ef06aee", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a", Pod:"csi-node-driver-484pr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali307092f28d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [INFO][4548] k8s.go 576: Cleaning up netns ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [INFO][4548] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns=""
Oct  2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [INFO][4548] k8s.go 583: Releasing IP address(es) ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [INFO][4548] utils.go 196: Calico CNI releasing IP address ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.492 [INFO][4554] ipam_plugin.go 416: Releasing address using handleID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:54.511121 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:54.511121 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.500 [WARNING][4554] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.500 [INFO][4554] ipam_plugin.go 444: Releasing address using workloadID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:54.511121 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.508 [INFO][4548] k8s.go 589: Teardown processing complete. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:54.511910 env[1311]: time="2023-10-02T19:16:54.511867401Z" level=info msg="TearDown network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" successfully"
Oct  2 19:16:54.512067 env[1311]: time="2023-10-02T19:16:54.512043703Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" returns successfully"
Oct  2 19:16:54.513411 env[1311]: time="2023-10-02T19:16:54.513376219Z" level=info msg="RemovePodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\""
Oct  2 19:16:54.513596 env[1311]: time="2023-10-02T19:16:54.513546121Z" level=info msg="Forcibly stopping sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\""
Oct  2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.607 [WARNING][4576] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51cdf950-fd56-4099-b416-942f3ef06aee", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a", Pod:"csi-node-driver-484pr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali307092f28d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.608 [INFO][4576] k8s.go 576: Cleaning up netns ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.611 [INFO][4576] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns=""
Oct  2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.611 [INFO][4576] k8s.go 583: Releasing IP address(es) ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.611 [INFO][4576] utils.go 196: Calico CNI releasing IP address ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.642 [INFO][4582] ipam_plugin.go 416: Releasing address using handleID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:54.652518 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:54.652518 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.649 [WARNING][4582] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.649 [INFO][4582] ipam_plugin.go 444: Releasing address using workloadID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0"
Oct  2 19:16:54.652518 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.651 [INFO][4576] k8s.go 589: Teardown processing complete. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f"
Oct  2 19:16:54.653238 env[1311]: time="2023-10-02T19:16:54.652543864Z" level=info msg="TearDown network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" successfully"
Oct  2 19:16:54.669543 env[1311]: time="2023-10-02T19:16:54.669500765Z" level=info msg="RemovePodSandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" returns successfully"
Oct  2 19:16:54.670081 env[1311]: time="2023-10-02T19:16:54.670049871Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\""
Oct  2 19:16:54.746320 env[1311]: time="2023-10-02T19:16:54.746268873Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:54.754851 env[1311]: time="2023-10-02T19:16:54.754806174Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:54.762803 env[1311]: time="2023-10-02T19:16:54.762766668Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [WARNING][4603] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6efed0db-4734-47a7-afef-8e4f010b2a81", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552", Pod:"coredns-787d4945fb-mdww6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8901d5a0345", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [INFO][4603] k8s.go 576: Cleaning up netns ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [INFO][4603] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns=""
Oct  2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [INFO][4603] k8s.go 583: Releasing IP address(es) ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [INFO][4603] utils.go 196: Calico CNI releasing IP address ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.753 [INFO][4609] ipam_plugin.go 416: Releasing address using handleID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:54.765591 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:54.765591 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.761 [WARNING][4609] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.761 [INFO][4609] ipam_plugin.go 444: Releasing address using workloadID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:54.765591 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.763 [INFO][4603] k8s.go 589: Teardown processing complete. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:54.766217 env[1311]: time="2023-10-02T19:16:54.765608701Z" level=info msg="TearDown network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" successfully"
Oct  2 19:16:54.766217 env[1311]: time="2023-10-02T19:16:54.765634502Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" returns successfully"
Oct  2 19:16:54.766217 env[1311]: time="2023-10-02T19:16:54.766114307Z" level=info msg="RemovePodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\""
Oct  2 19:16:54.766217 env[1311]: time="2023-10-02T19:16:54.766147708Z" level=info msg="Forcibly stopping sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\""
Oct  2 19:16:54.769139 env[1311]: time="2023-10-02T19:16:54.769100743Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:16:54.769529 env[1311]: time="2023-10-02T19:16:54.769498947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\""
Oct  2 19:16:54.774073 env[1311]: time="2023-10-02T19:16:54.774041901Z" level=info msg="CreateContainer within sandbox \"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}"
Oct  2 19:16:54.804781 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2884014475.mount: Deactivated successfully.
Oct  2 19:16:54.814863 env[1311]: time="2023-10-02T19:16:54.814804783Z" level=info msg="CreateContainer within sandbox \"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef\""
Oct  2 19:16:54.817310 env[1311]: time="2023-10-02T19:16:54.815760194Z" level=info msg="StartContainer for \"4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef\""
Oct  2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.813 [WARNING][4630] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6efed0db-4734-47a7-afef-8e4f010b2a81", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552", Pod:"coredns-787d4945fb-mdww6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8901d5a0345", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.813 [INFO][4630] k8s.go 576: Cleaning up netns ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.814 [INFO][4630] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns=""
Oct  2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.814 [INFO][4630] k8s.go 583: Releasing IP address(es) ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.814 [INFO][4630] utils.go 196: Calico CNI releasing IP address ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.846 [INFO][4637] ipam_plugin.go 416: Releasing address using handleID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:54.865547 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:54.865547 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.853 [WARNING][4637] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.853 [INFO][4637] ipam_plugin.go 444: Releasing address using workloadID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0"
Oct  2 19:16:54.865547 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.863 [INFO][4630] k8s.go 589: Teardown processing complete. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44"
Oct  2 19:16:54.866252 env[1311]: time="2023-10-02T19:16:54.865583484Z" level=info msg="TearDown network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" successfully"
Oct  2 19:16:54.869181 systemd[1]: Started cri-containerd-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef.scope.
Oct  2 19:16:54.878164 env[1311]: time="2023-10-02T19:16:54.878108632Z" level=info msg="RemovePodSandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" returns successfully"
Oct  2 19:16:54.878630 env[1311]: time="2023-10-02T19:16:54.878582637Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\""
Oct  2 19:16:54.886000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.886000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.886000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.886000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.887000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.887000 audit: BPF prog-id=171 op=LOAD
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:54.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:54.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.888000 audit: BPF prog-id=172 op=LOAD
Oct  2 19:16:54.888000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000094c50 items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:54.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit: BPF prog-id=173 op=LOAD
Oct  2 19:16:54.889000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000094c98 items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:54.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437
Oct  2 19:16:54.889000 audit: BPF prog-id=173 op=UNLOAD
Oct  2 19:16:54.889000 audit: BPF prog-id=172 op=UNLOAD
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { perfmon } for  pid=4648 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit[4648]: AVC avc:  denied  { bpf } for  pid=4648 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:54.889000 audit: BPF prog-id=174 op=LOAD
Oct  2 19:16:54.889000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000950a8 items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:54.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437
Oct  2 19:16:54.920226 env[1311]: time="2023-10-02T19:16:54.917078192Z" level=info msg="StartContainer for \"4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef\" returns successfully"
Oct  2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [WARNING][4682] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"51cd6516-73d5-4525-9aa3-c3b0c6013145", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67", Pod:"calico-kube-controllers-69c848ddc6-z4r7k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa057d8a91c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [INFO][4682] k8s.go 576: Cleaning up netns ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [INFO][4682] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns=""
Oct  2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [INFO][4682] k8s.go 583: Releasing IP address(es) ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [INFO][4682] utils.go 196: Calico CNI releasing IP address ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.975 [INFO][4699] ipam_plugin.go 416: Releasing address using handleID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:54.995427 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:54.995427 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.985 [WARNING][4699] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.985 [INFO][4699] ipam_plugin.go 444: Releasing address using workloadID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:54.995427 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.994 [INFO][4682] k8s.go 589: Teardown processing complete. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:54.996326 env[1311]: time="2023-10-02T19:16:54.996286929Z" level=info msg="TearDown network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" successfully"
Oct  2 19:16:54.996428 env[1311]: time="2023-10-02T19:16:54.996405730Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" returns successfully"
Oct  2 19:16:54.997072 env[1311]: time="2023-10-02T19:16:54.997041938Z" level=info msg="RemovePodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\""
Oct  2 19:16:54.997346 env[1311]: time="2023-10-02T19:16:54.997299541Z" level=info msg="Forcibly stopping sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\""
Oct  2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [WARNING][4721] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"51cd6516-73d5-4525-9aa3-c3b0c6013145", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67", Pod:"calico-kube-controllers-69c848ddc6-z4r7k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa057d8a91c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [INFO][4721] k8s.go 576: Cleaning up netns ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [INFO][4721] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns=""
Oct  2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [INFO][4721] k8s.go 583: Releasing IP address(es) ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [INFO][4721] utils.go 196: Calico CNI releasing IP address ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.091 [INFO][4727] ipam_plugin.go 416: Releasing address using handleID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:55.104289 env[1311]: time="2023-10-02T19:16:55Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:55.104289 env[1311]: time="2023-10-02T19:16:55Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.100 [WARNING][4727] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.101 [INFO][4727] ipam_plugin.go 444: Releasing address using workloadID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0"
Oct  2 19:16:55.104289 env[1311]: time="2023-10-02T19:16:55Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.103 [INFO][4721] k8s.go 589: Teardown processing complete. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d"
Oct  2 19:16:55.105329 env[1311]: time="2023-10-02T19:16:55.105280604Z" level=info msg="TearDown network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" successfully"
Oct  2 19:16:55.131250 env[1311]: time="2023-10-02T19:16:55.131196307Z" level=info msg="RemovePodSandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" returns successfully"
Oct  2 19:16:55.405085 kubelet[2467]: I1002 19:16:55.404169    2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k" podStartSLOduration=-9.223371994450651e+09 pod.CreationTimestamp="2023-10-02 19:16:13 +0000 UTC" firstStartedPulling="2023-10-02 19:16:49.543489878 +0000 UTC m=+55.658671619" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:55.345242709 +0000 UTC m=+61.460424550" watchObservedRunningTime="2023-10-02 19:16:55.404125097 +0000 UTC m=+61.519306938"
Oct  2 19:16:55.798690 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.RUEq0f.mount: Deactivated successfully.
Oct  2 19:16:57.390245 kubelet[2467]: I1002 19:16:57.390205    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:57.397156 systemd[1]: Created slice kubepods-besteffort-pod565fa6da_ca7f_46dc_99b0_bf7e5cab228f.slice.
Oct  2 19:16:57.414365 kubelet[2467]: I1002 19:16:57.414329    2467 topology_manager.go:210] "Topology Admit Handler"
Oct  2 19:16:57.421343 systemd[1]: Created slice kubepods-besteffort-pod57e4bdff_509a_4176_905b_82f7b771260a.slice.
Oct  2 19:16:57.474909 kubelet[2467]: I1002 19:16:57.474870    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8p57v\" (UniqueName: \"kubernetes.io/projected/57e4bdff-509a-4176-905b-82f7b771260a-kube-api-access-8p57v\") pod \"calico-apiserver-5cd4d54db4-89fvv\" (UID: \"57e4bdff-509a-4176-905b-82f7b771260a\") " pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv"
Oct  2 19:16:57.475134 kubelet[2467]: I1002 19:16:57.474938    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltg65\" (UniqueName: \"kubernetes.io/projected/565fa6da-ca7f-46dc-99b0-bf7e5cab228f-kube-api-access-ltg65\") pod \"calico-apiserver-5cd4d54db4-twr8h\" (UID: \"565fa6da-ca7f-46dc-99b0-bf7e5cab228f\") " pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h"
Oct  2 19:16:57.475134 kubelet[2467]: I1002 19:16:57.475027    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/57e4bdff-509a-4176-905b-82f7b771260a-calico-apiserver-certs\") pod \"calico-apiserver-5cd4d54db4-89fvv\" (UID: \"57e4bdff-509a-4176-905b-82f7b771260a\") " pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv"
Oct  2 19:16:57.475134 kubelet[2467]: I1002 19:16:57.475079    2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/565fa6da-ca7f-46dc-99b0-bf7e5cab228f-calico-apiserver-certs\") pod \"calico-apiserver-5cd4d54db4-twr8h\" (UID: \"565fa6da-ca7f-46dc-99b0-bf7e5cab228f\") " pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h"
Oct  2 19:16:57.483000 audit[4778]: NETFILTER_CFG table=filter:131 family=2 entries=7 op=nft_register_rule pid=4778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:57.483000 audit[4778]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffbb06bf00 a2=0 a3=7fffbb06beec items=0 ppid=2658 pid=4778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:57.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:57.493000 audit[4778]: NETFILTER_CFG table=nat:132 family=2 entries=78 op=nft_register_rule pid=4778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:57.493000 audit[4778]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffbb06bf00 a2=0 a3=7fffbb06beec items=0 ppid=2658 pid=4778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:57.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:57.568000 audit[4806]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:57.568000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffefa1fa4d0 a2=0 a3=7ffefa1fa4bc items=0 ppid=2658 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:57.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:57.572000 audit[4806]: NETFILTER_CFG table=nat:134 family=2 entries=78 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:57.572000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffefa1fa4d0 a2=0 a3=7ffefa1fa4bc items=0 ppid=2658 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:57.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:57.704065 env[1311]: time="2023-10-02T19:16:57.703906270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cd4d54db4-twr8h,Uid:565fa6da-ca7f-46dc-99b0-bf7e5cab228f,Namespace:calico-apiserver,Attempt:0,}"
Oct  2 19:16:57.727730 env[1311]: time="2023-10-02T19:16:57.727687041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cd4d54db4-89fvv,Uid:57e4bdff-509a-4176-905b-82f7b771260a,Namespace:calico-apiserver,Attempt:0,}"
Oct  2 19:16:57.914977 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 19:16:57.915107 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid5f5573b2c5: link becomes ready
Oct  2 19:16:57.924546 systemd-networkd[1452]: calid5f5573b2c5: Link UP
Oct  2 19:16:57.924556 systemd-networkd[1452]: calid5f5573b2c5: Gained carrier
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.790 [INFO][4811] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0 calico-apiserver-5cd4d54db4- calico-apiserver  565fa6da-ca7f-46dc-99b0-bf7e5cab228f 820 0 2023-10-02 19:16:57 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cd4d54db4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] []  []} {k8s  ci-3510.3.0-a-e4b0ec5c33  calico-apiserver-5cd4d54db4-twr8h eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid5f5573b2c5  [] []}} ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.790 [INFO][4811] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.859 [INFO][4834] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" HandleID="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.870 [INFO][4834] ipam_plugin.go 269: Auto assigning IP ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" HandleID="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000417cb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"calico-apiserver-5cd4d54db4-twr8h", "timestamp":"2023-10-02 19:16:57.859969354 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:16:57.935653 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:57.935653 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.872 [INFO][4834] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33'
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.873 [INFO][4834] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.877 [INFO][4834] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.885 [INFO][4834] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.887 [INFO][4834] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.893 [INFO][4834] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.893 [INFO][4834] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.894 [INFO][4834] ipam.go 1682: Creating new handle: k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.898 [INFO][4834] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.902 [INFO][4834] ipam.go 1216: Successfully claimed IPs: [192.168.25.197/26] block=192.168.25.192/26 handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.902 [INFO][4834] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.197/26] handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:57.935653 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.902 [INFO][4834] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.197/26] IPv6=[] ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" HandleID="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0"
Oct  2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.903 [INFO][4811] k8s.go 383: Populated endpoint ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0", GenerateName:"calico-apiserver-5cd4d54db4-", Namespace:"calico-apiserver", SelfLink:"", UID:"565fa6da-ca7f-46dc-99b0-bf7e5cab228f", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cd4d54db4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"calico-apiserver-5cd4d54db4-twr8h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.25.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5f5573b2c5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.903 [INFO][4811] k8s.go 384: Calico CNI using IPs: [192.168.25.197/32] ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0"
Oct  2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.903 [INFO][4811] dataplane_linux.go 68: Setting the host side veth name to calid5f5573b2c5 ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0"
Oct  2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.916 [INFO][4811] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0"
Oct  2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.924 [INFO][4811] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0", GenerateName:"calico-apiserver-5cd4d54db4-", Namespace:"calico-apiserver", SelfLink:"", UID:"565fa6da-ca7f-46dc-99b0-bf7e5cab228f", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cd4d54db4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8", Pod:"calico-apiserver-5cd4d54db4-twr8h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.25.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5f5573b2c5", MAC:"3a:d2:77:a9:de:19", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.933 [INFO][4811] k8s.go 489: Wrote updated endpoint to datastore ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0"
Oct  2 19:16:57.967936 env[1311]: time="2023-10-02T19:16:57.967797787Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:57.968190 env[1311]: time="2023-10-02T19:16:57.968160991Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:57.968328 env[1311]: time="2023-10-02T19:16:57.968305092Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:57.968589 env[1311]: time="2023-10-02T19:16:57.968559095Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8 pid=4866 runtime=io.containerd.runc.v2
Oct  2 19:16:57.996018 systemd[1]: Started cri-containerd-11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8.scope.
Oct  2 19:16:58.001004 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali56e6bbb99a7: link becomes ready
Oct  2 19:16:58.010151 systemd-networkd[1452]: cali56e6bbb99a7: Link UP
Oct  2 19:16:58.010160 systemd-networkd[1452]: cali56e6bbb99a7: Gained carrier
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.825 [INFO][4820] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0 calico-apiserver-5cd4d54db4- calico-apiserver  57e4bdff-509a-4176-905b-82f7b771260a 825 0 2023-10-02 19:16:57 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cd4d54db4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] []  []} {k8s  ci-3510.3.0-a-e4b0ec5c33  calico-apiserver-5cd4d54db4-89fvv eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali56e6bbb99a7  [] []}} ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.825 [INFO][4820] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.891 [INFO][4840] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" HandleID="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.916 [INFO][4840] ipam_plugin.go 269: Auto assigning IP ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" HandleID="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a710), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"calico-apiserver-5cd4d54db4-89fvv", "timestamp":"2023-10-02 19:16:57.891387913 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:16:58.024663 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:16:58.024663 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.917 [INFO][4840] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33'
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.918 [INFO][4840] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.948 [INFO][4840] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.957 [INFO][4840] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.959 [INFO][4840] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.962 [INFO][4840] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.962 [INFO][4840] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.964 [INFO][4840] ipam.go 1682: Creating new handle: k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.972 [INFO][4840] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.980 [INFO][4840] ipam.go 1216: Successfully claimed IPs: [192.168.25.198/26] block=192.168.25.192/26 handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.980 [INFO][4840] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.198/26] handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33"
Oct  2 19:16:58.024663 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.980 [INFO][4840] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.198/26] IPv6=[] ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" HandleID="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0"
Oct  2 19:16:58.025610 env[1311]: 2023-10-02 19:16:57.986 [INFO][4820] k8s.go 383: Populated endpoint ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0", GenerateName:"calico-apiserver-5cd4d54db4-", Namespace:"calico-apiserver", SelfLink:"", UID:"57e4bdff-509a-4176-905b-82f7b771260a", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cd4d54db4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"calico-apiserver-5cd4d54db4-89fvv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.25.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali56e6bbb99a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:58.025610 env[1311]: 2023-10-02 19:16:57.986 [INFO][4820] k8s.go 384: Calico CNI using IPs: [192.168.25.198/32] ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0"
Oct  2 19:16:58.025610 env[1311]: 2023-10-02 19:16:57.986 [INFO][4820] dataplane_linux.go 68: Setting the host side veth name to cali56e6bbb99a7 ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0"
Oct  2 19:16:58.025610 env[1311]: 2023-10-02 19:16:58.004 [INFO][4820] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0"
Oct  2 19:16:58.025610 env[1311]: 2023-10-02 19:16:58.009 [INFO][4820] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0", GenerateName:"calico-apiserver-5cd4d54db4-", Namespace:"calico-apiserver", SelfLink:"", UID:"57e4bdff-509a-4176-905b-82f7b771260a", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cd4d54db4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97", Pod:"calico-apiserver-5cd4d54db4-89fvv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.25.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali56e6bbb99a7", MAC:"52:19:a8:34:4b:ca", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:16:58.025610 env[1311]: 2023-10-02 19:16:58.022 [INFO][4820] k8s.go 489: Wrote updated endpoint to datastore ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0"
Oct  2 19:16:58.046315 env[1311]: time="2023-10-02T19:16:58.046248678Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:16:58.046539 env[1311]: time="2023-10-02T19:16:58.046512181Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:16:58.046648 env[1311]: time="2023-10-02T19:16:58.046624682Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:16:58.046874 env[1311]: time="2023-10-02T19:16:58.046842385Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97 pid=4913 runtime=io.containerd.runc.v2
Oct  2 19:16:58.074822 systemd[1]: Started cri-containerd-eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97.scope.
Oct  2 19:16:58.080000 audit[4933]: NETFILTER_CFG table=filter:135 family=2 entries=59 op=nft_register_chain pid=4933 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:58.080000 audit[4933]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffe1dd596d0 a2=0 a3=7ffe1dd596bc items=0 ppid=3629 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.080000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.081000 audit: BPF prog-id=175 op=LOAD
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.083000 audit: BPF prog-id=176 op=LOAD
Oct  2 19:16:58.083000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000284f00 items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163
Oct  2 19:16:58.084000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.084000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.084000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.084000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.084000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.084000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.084000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.084000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.084000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.084000 audit: BPF prog-id=177 op=LOAD
Oct  2 19:16:58.084000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000284f48 items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163
Oct  2 19:16:58.085000 audit: BPF prog-id=177 op=UNLOAD
Oct  2 19:16:58.085000 audit: BPF prog-id=176 op=UNLOAD
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { perfmon } for  pid=4880 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit[4880]: AVC avc:  denied  { bpf } for  pid=4880 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.085000 audit: BPF prog-id=178 op=LOAD
Oct  2 19:16:58.085000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000285358 items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.097000 audit: BPF prog-id=179 op=LOAD
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit: BPF prog-id=180 op=LOAD
Oct  2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025d3a0 items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit: BPF prog-id=181 op=LOAD
Oct  2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025d3e8 items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135
Oct  2 19:16:58.098000 audit: BPF prog-id=181 op=UNLOAD
Oct  2 19:16:58.098000 audit: BPF prog-id=180 op=UNLOAD
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { perfmon } for  pid=4924 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit[4924]: AVC avc:  denied  { bpf } for  pid=4924 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:16:58.098000 audit: BPF prog-id=182 op=LOAD
Oct  2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00025d7f8 items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135
Oct  2 19:16:58.150597 env[1311]: time="2023-10-02T19:16:58.150528357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cd4d54db4-twr8h,Uid:565fa6da-ca7f-46dc-99b0-bf7e5cab228f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8\""
Oct  2 19:16:58.152621 env[1311]: time="2023-10-02T19:16:58.152587881Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:16:58.153000 audit[4954]: NETFILTER_CFG table=filter:136 family=2 entries=50 op=nft_register_chain pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:16:58.153000 audit[4954]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7fff2f2e3b30 a2=0 a3=7fff2f2e3b1c items=0 ppid=3629 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:58.153000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:16:58.169683 env[1311]: time="2023-10-02T19:16:58.169651674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cd4d54db4-89fvv,Uid:57e4bdff-509a-4176-905b-82f7b771260a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97\""
Oct  2 19:16:58.461832 env[1311]: time="2023-10-02T19:16:58.461753477Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:16:58.464714 env[1311]: time="2023-10-02T19:16:58.464654810Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:16:58.464991 kubelet[2467]: E1002 19:16:58.464937    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:16:58.465376 kubelet[2467]: E1002 19:16:58.465020    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:16:58.465376 kubelet[2467]: E1002 19:16:58.465326    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:16:58.465376 kubelet[2467]: E1002 19:16:58.465377    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:16:58.465860 env[1311]: time="2023-10-02T19:16:58.465829623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:16:58.773844 env[1311]: time="2023-10-02T19:16:58.773685605Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:16:58.776756 env[1311]: time="2023-10-02T19:16:58.776693939Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:16:58.777322 kubelet[2467]: E1002 19:16:58.777293    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:16:58.777495 kubelet[2467]: E1002 19:16:58.777344    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:16:58.777577 kubelet[2467]: E1002 19:16:58.777493    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:16:58.777577 kubelet[2467]: E1002 19:16:58.777556    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:16:59.348301 kubelet[2467]: E1002 19:16:59.348102    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:16:59.348301 kubelet[2467]: E1002 19:16:59.348155    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:16:59.412000 audit[4989]: NETFILTER_CFG table=filter:137 family=2 entries=8 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:59.417083 kernel: kauditd_printk_skb: 191 callbacks suppressed
Oct  2 19:16:59.417186 kernel: audit: type=1325 audit(1696274219.412:1350): table=filter:137 family=2 entries=8 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:59.428965 kernel: audit: type=1300 audit(1696274219.412:1350): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffac122780 a2=0 a3=7fffac12276c items=0 ppid=2658 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:59.412000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffac122780 a2=0 a3=7fffac12276c items=0 ppid=2658 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:59.447345 kernel: audit: type=1327 audit(1696274219.412:1350): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:59.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:59.412000 audit[4989]: NETFILTER_CFG table=nat:138 family=2 entries=78 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:59.466654 kernel: audit: type=1325 audit(1696274219.412:1351): table=nat:138 family=2 entries=78 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:59.467352 kernel: audit: type=1300 audit(1696274219.412:1351): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffac122780 a2=0 a3=7fffac12276c items=0 ppid=2658 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:59.412000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffac122780 a2=0 a3=7fffac12276c items=0 ppid=2658 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:59.497988 kernel: audit: type=1327 audit(1696274219.412:1351): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:59.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:59.522000 audit[5015]: NETFILTER_CFG table=filter:139 family=2 entries=8 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:59.522000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc8bd37b70 a2=0 a3=7ffc8bd37b5c items=0 ppid=2658 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:59.553004 kernel: audit: type=1325 audit(1696274219.522:1352): table=filter:139 family=2 entries=8 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:59.553107 kernel: audit: type=1300 audit(1696274219.522:1352): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc8bd37b70 a2=0 a3=7ffc8bd37b5c items=0 ppid=2658 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:59.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:59.553976 kernel: audit: type=1327 audit(1696274219.522:1352): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:59.524000 audit[5015]: NETFILTER_CFG table=nat:140 family=2 entries=78 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:59.563962 kernel: audit: type=1325 audit(1696274219.524:1353): table=nat:140 family=2 entries=78 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:16:59.524000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc8bd37b70 a2=0 a3=7ffc8bd37b5c items=0 ppid=2658 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:16:59.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:16:59.665185 systemd-networkd[1452]: calid5f5573b2c5: Gained IPv6LL
Oct  2 19:16:59.857195 systemd-networkd[1452]: cali56e6bbb99a7: Gained IPv6LL
Oct  2 19:17:03.498864 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.0e6dhs.mount: Deactivated successfully.
Oct  2 19:17:04.135453 env[1311]: time="2023-10-02T19:17:04.135408852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 19:17:04.429097 env[1311]: time="2023-10-02T19:17:04.428735177Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:17:04.432552 env[1311]: time="2023-10-02T19:17:04.432491317Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:17:04.432830 kubelet[2467]: E1002 19:17:04.432806    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:17:04.433201 kubelet[2467]: E1002 19:17:04.432851    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:17:04.433201 kubelet[2467]: E1002 19:17:04.432995    2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:17:04.434546 env[1311]: time="2023-10-02T19:17:04.434300036Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 19:17:04.729337 env[1311]: time="2023-10-02T19:17:04.729202377Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:17:04.732104 env[1311]: time="2023-10-02T19:17:04.732045207Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:17:04.732303 kubelet[2467]: E1002 19:17:04.732274    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:17:04.732409 kubelet[2467]: E1002 19:17:04.732325    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:17:04.732463 kubelet[2467]: E1002 19:17:04.732434    2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:17:04.732585 kubelet[2467]: E1002 19:17:04.732501    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:17:11.134054 env[1311]: time="2023-10-02T19:17:11.133982062Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:17:11.422713 env[1311]: time="2023-10-02T19:17:11.422463654Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:17:11.425716 env[1311]: time="2023-10-02T19:17:11.425654786Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:17:11.426098 kubelet[2467]: E1002 19:17:11.426068    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:17:11.426527 kubelet[2467]: E1002 19:17:11.426124    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:17:11.426527 kubelet[2467]: E1002 19:17:11.426284    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:17:11.426527 kubelet[2467]: E1002 19:17:11.426344    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:17:13.134209 env[1311]: time="2023-10-02T19:17:13.134115717Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:17:13.303564 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.V2w9Pu.mount: Deactivated successfully.
Oct  2 19:17:13.444757 env[1311]: time="2023-10-02T19:17:13.444612782Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:17:13.448773 env[1311]: time="2023-10-02T19:17:13.448713323Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:17:13.449068 kubelet[2467]: E1002 19:17:13.449025    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:17:13.449424 kubelet[2467]: E1002 19:17:13.449095    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:17:13.449822 kubelet[2467]: E1002 19:17:13.449793    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:17:13.450022 kubelet[2467]: E1002 19:17:13.449873    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:17:14.295979 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.DklSkS.mount: Deactivated successfully.
Oct  2 19:17:20.138175 kubelet[2467]: E1002 19:17:20.137932    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:17:23.292276 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.YiUMHQ.mount: Deactivated successfully.
Oct  2 19:17:23.501008 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.WENT9H.mount: Deactivated successfully.
Oct  2 19:17:24.134513 kubelet[2467]: E1002 19:17:24.134172    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:17:25.133432 kubelet[2467]: E1002 19:17:25.133395    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:17:31.135852 env[1311]: time="2023-10-02T19:17:31.134578882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 19:17:31.464678 env[1311]: time="2023-10-02T19:17:31.464496600Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:17:31.469848 env[1311]: time="2023-10-02T19:17:31.469781947Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:17:31.470219 kubelet[2467]: E1002 19:17:31.470188    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:17:31.470651 kubelet[2467]: E1002 19:17:31.470259    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:17:31.470651 kubelet[2467]: E1002 19:17:31.470442    2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:17:31.471775 env[1311]: time="2023-10-02T19:17:31.471739164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 19:17:31.776809 env[1311]: time="2023-10-02T19:17:31.776637961Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:17:31.782675 env[1311]: time="2023-10-02T19:17:31.782603014Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:17:31.782908 kubelet[2467]: E1002 19:17:31.782883    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:17:31.783044 kubelet[2467]: E1002 19:17:31.782968    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:17:31.783123 kubelet[2467]: E1002 19:17:31.783101    2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:17:31.783283 kubelet[2467]: E1002 19:17:31.783184    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:17:33.299492 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.D6vUJM.mount: Deactivated successfully.
Oct  2 19:17:34.290215 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.maWEEb.mount: Deactivated successfully.
Oct  2 19:17:36.134418 env[1311]: time="2023-10-02T19:17:36.134373278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:17:36.438178 env[1311]: time="2023-10-02T19:17:36.438023505Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:17:36.444121 env[1311]: time="2023-10-02T19:17:36.444004856Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:17:36.444636 kubelet[2467]: E1002 19:17:36.444567    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:17:36.445302 kubelet[2467]: E1002 19:17:36.444662    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:17:36.445302 kubelet[2467]: E1002 19:17:36.444988    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:17:36.445302 kubelet[2467]: E1002 19:17:36.445082    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:17:38.134495 env[1311]: time="2023-10-02T19:17:38.134069230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:17:38.431957 env[1311]: time="2023-10-02T19:17:38.431653584Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:17:38.438127 env[1311]: time="2023-10-02T19:17:38.437987738Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:17:38.438622 kubelet[2467]: E1002 19:17:38.438571    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:17:38.439084 kubelet[2467]: E1002 19:17:38.438670    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:17:38.439084 kubelet[2467]: E1002 19:17:38.438827    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:17:38.439084 kubelet[2467]: E1002 19:17:38.438871    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:17:46.135369 kubelet[2467]: E1002 19:17:46.135332    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:17:48.497000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:48.502868 kernel: kauditd_printk_skb: 2 callbacks suppressed
Oct  2 19:17:48.503003 kernel: audit: type=1400 audit(1696274268.497:1354): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:48.497000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019b6c30 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:48.540820 kernel: audit: type=1300 audit(1696274268.497:1354): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019b6c30 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:48.540973 kernel: audit: type=1327 audit(1696274268.497:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:48.497000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:48.510000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:48.510000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001fd49c0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:48.599528 kernel: audit: type=1400 audit(1696274268.510:1355): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:48.599652 kernel: audit: type=1300 audit(1696274268.510:1355): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001fd49c0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:48.599685 kernel: audit: type=1327 audit(1696274268.510:1355): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:48.510000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:49.133662 kubelet[2467]: E1002 19:17:49.133624    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:17:50.461000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:50.461000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c009266180 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:17:50.499502 kernel: audit: type=1400 audit(1696274270.461:1356): avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:50.499639 kernel: audit: type=1300 audit(1696274270.461:1356): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c009266180 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:17:50.499706 kernel: audit: type=1327 audit(1696274270.461:1356): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:17:50.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:17:50.526239 kernel: audit: type=1400 audit(1696274270.482:1357): avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:50.482000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:50.482000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0092661b0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:17:50.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:17:50.498000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:50.498000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011d812a0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:17:50.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:17:50.500000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:50.500000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c009266300 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:17:50.500000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:17:50.553000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:50.553000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c011d812c0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:17:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c009266390 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:17:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:17:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:17:51.133762 kubelet[2467]: E1002 19:17:51.133728    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:17:53.301769 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.roID4B.mount: Deactivated successfully.
Oct  2 19:17:53.603000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:53.608547 kernel: kauditd_printk_skb: 14 callbacks suppressed
Oct  2 19:17:53.608661 kernel: audit: type=1400 audit(1696274273.603:1362): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:53.603000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7baa0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:53.647970 kernel: audit: type=1300 audit(1696274273.603:1362): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7baa0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:53.648076 kernel: audit: type=1327 audit(1696274273.603:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:53.603000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:53.664426 kernel: audit: type=1400 audit(1696274273.604:1363): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:53.604000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f7bac0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:53.680017 kernel: audit: type=1300 audit(1696274273.604:1363): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f7bac0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:53.719239 kernel: audit: type=1327 audit(1696274273.604:1363): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:53.604000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:53.735319 kernel: audit: type=1400 audit(1696274273.604:1364): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:53.735413 kernel: audit: type=1300 audit(1696274273.604:1364): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7bae0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7bae0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:53.775038 kernel: audit: type=1327 audit(1696274273.604:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:53.775140 kernel: audit: type=1400 audit(1696274273.605:1365): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:53.605000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:17:53.605000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7bd20 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:17:53.605000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:17:54.291002 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.DaJdi5.mount: Deactivated successfully.
Oct  2 19:18:00.133570 kubelet[2467]: E1002 19:18:00.133533    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:18:01.134575 kubelet[2467]: E1002 19:18:01.134529    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:18:03.297270 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.789MM1.mount: Deactivated successfully.
Oct  2 19:18:04.133869 kubelet[2467]: E1002 19:18:04.133841    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:18:04.290963 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.t5Enb8.mount: Deactivated successfully.
Oct  2 19:18:11.133738 kubelet[2467]: E1002 19:18:11.133691    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:18:13.294018 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.A7bPTt.mount: Deactivated successfully.
Oct  2 19:18:13.501198 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.uVGa3b.mount: Deactivated successfully.
Oct  2 19:18:14.290446 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.7DQz3E.mount: Deactivated successfully.
Oct  2 19:18:15.133826 env[1311]: time="2023-10-02T19:18:15.133772919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 19:18:15.439377 env[1311]: time="2023-10-02T19:18:15.439227010Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:18:15.444504 env[1311]: time="2023-10-02T19:18:15.444360971Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:18:15.444743 kubelet[2467]: E1002 19:18:15.444715    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:18:15.445111 kubelet[2467]: E1002 19:18:15.444766    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:18:15.445111 kubelet[2467]: E1002 19:18:15.444910    2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:18:15.446089 env[1311]: time="2023-10-02T19:18:15.446057224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 19:18:15.738312 env[1311]: time="2023-10-02T19:18:15.738071293Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:18:15.744090 env[1311]: time="2023-10-02T19:18:15.743938977Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:18:15.744308 kubelet[2467]: E1002 19:18:15.744273    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:18:15.744436 kubelet[2467]: E1002 19:18:15.744334    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:18:15.744504 kubelet[2467]: E1002 19:18:15.744467    2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:18:15.744666 kubelet[2467]: E1002 19:18:15.744555    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:18:17.133507 kubelet[2467]: E1002 19:18:17.133474    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:18:22.135146 env[1311]: time="2023-10-02T19:18:22.135094523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:18:22.438350 env[1311]: time="2023-10-02T19:18:22.438182920Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:18:22.443089 env[1311]: time="2023-10-02T19:18:22.443032762Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:18:22.443336 kubelet[2467]: E1002 19:18:22.443313    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:18:22.443715 kubelet[2467]: E1002 19:18:22.443372    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:18:22.443715 kubelet[2467]: E1002 19:18:22.443568    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:18:22.443715 kubelet[2467]: E1002 19:18:22.443634    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:18:23.298913 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.O1GOxX.mount: Deactivated successfully.
Oct  2 19:18:23.499874 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.IicKQ1.mount: Deactivated successfully.
Oct  2 19:18:27.134456 kubelet[2467]: E1002 19:18:27.134424    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:18:30.135940 env[1311]: time="2023-10-02T19:18:30.135879079Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:18:30.450032 env[1311]: time="2023-10-02T19:18:30.449841744Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:18:30.454432 env[1311]: time="2023-10-02T19:18:30.454373967Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:18:30.454685 kubelet[2467]: E1002 19:18:30.454655    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:18:30.455165 kubelet[2467]: E1002 19:18:30.454713    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:18:30.455165 kubelet[2467]: E1002 19:18:30.454868    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:18:30.455165 kubelet[2467]: E1002 19:18:30.454931    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:18:33.523890 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.DTpcYT.mount: Deactivated successfully.
Oct  2 19:18:35.133178 kubelet[2467]: E1002 19:18:35.133148    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:18:38.135519 kubelet[2467]: E1002 19:18:38.135481    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:18:42.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.37:22-10.200.12.6:37690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:18:42.007500 systemd[1]: Started sshd@7-10.200.8.37:22-10.200.12.6:37690.service.
Oct  2 19:18:42.012696 kernel: kauditd_printk_skb: 2 callbacks suppressed
Oct  2 19:18:42.012765 kernel: audit: type=1130 audit(1696274322.006:1366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.37:22-10.200.12.6:37690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:18:42.723000 audit[5702]: USER_ACCT pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:42.725976 sshd[5702]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:18:42.742858 sshd[5702]: Accepted publickey for core from 10.200.12.6 port 37690 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:18:42.743073 kernel: audit: type=1101 audit(1696274322.723:1367): pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:42.743112 kernel: audit: type=1103 audit(1696274322.724:1368): pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:42.724000 audit[5702]: CRED_ACQ pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:42.761225 systemd-logind[1290]: New session 10 of user core.
Oct  2 19:18:42.761868 systemd[1]: Started session-10.scope.
Oct  2 19:18:42.724000 audit[5702]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62718970 a2=3 a3=0 items=0 ppid=1 pid=5702 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:18:42.791829 kernel: audit: type=1006 audit(1696274322.724:1369): pid=5702 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1
Oct  2 19:18:42.791972 kernel: audit: type=1300 audit(1696274322.724:1369): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62718970 a2=3 a3=0 items=0 ppid=1 pid=5702 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:18:42.792005 kernel: audit: type=1327 audit(1696274322.724:1369): proctitle=737368643A20636F7265205B707269765D
Oct  2 19:18:42.724000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:18:42.762000 audit[5702]: USER_START pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:42.816449 kernel: audit: type=1105 audit(1696274322.762:1370): pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:42.768000 audit[5704]: CRED_ACQ pid=5704 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:42.834672 kernel: audit: type=1103 audit(1696274322.768:1371): pid=5704 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:43.132984 kubelet[2467]: E1002 19:18:43.132961    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:18:43.302813 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.RuIIq7.mount: Deactivated successfully.
Oct  2 19:18:43.352931 sshd[5702]: pam_unix(sshd:session): session closed for user core
Oct  2 19:18:43.353000 audit[5702]: USER_END pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:43.355781 systemd[1]: sshd@7-10.200.8.37:22-10.200.12.6:37690.service: Deactivated successfully.
Oct  2 19:18:43.357395 systemd[1]: session-10.scope: Deactivated successfully.
Oct  2 19:18:43.358259 systemd-logind[1290]: Session 10 logged out. Waiting for processes to exit.
Oct  2 19:18:43.359122 systemd-logind[1290]: Removed session 10.
Oct  2 19:18:43.374968 kernel: audit: type=1106 audit(1696274323.353:1372): pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:43.353000 audit[5702]: CRED_DISP pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:43.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.37:22-10.200.12.6:37690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:18:43.397029 kernel: audit: type=1104 audit(1696274323.353:1373): pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:44.296381 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.0UYqMK.mount: Deactivated successfully.
Oct  2 19:18:48.512981 kernel: kauditd_printk_skb: 1 callbacks suppressed
Oct  2 19:18:48.513145 kernel: audit: type=1400 audit(1696274328.498:1375): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:48.498000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:48.511000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:48.537375 kernel: audit: type=1400 audit(1696274328.511:1376): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:48.511000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002da20e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:48.558950 kernel: audit: type=1300 audit(1696274328.511:1376): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002da20e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:48.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:48.559963 kernel: audit: type=1327 audit(1696274328.511:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:48.498000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d9c060 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:48.601001 kernel: audit: type=1300 audit(1696274328.498:1375): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d9c060 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:48.601153 kernel: audit: type=1327 audit(1696274328.498:1375): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:48.498000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:49.133293 kubelet[2467]: E1002 19:18:49.133257    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:18:50.464000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:50.464000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0050f3e60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:18:50.503955 kernel: audit: type=1400 audit(1696274330.464:1377): avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:50.504072 kernel: audit: type=1300 audit(1696274330.464:1377): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0050f3e60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:18:50.504104 kernel: audit: type=1327 audit(1696274330.464:1377): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:18:50.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:18:50.483000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:50.538264 kernel: audit: type=1400 audit(1696274330.483:1378): avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:50.483000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c000eb7770 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:18:50.483000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:18:50.499000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:50.499000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00183da00 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:18:50.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:18:50.501000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:50.501000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c000d805a0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:18:50.501000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:18:50.552000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:50.553000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00183da40 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:18:50.552000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0009c0390 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:18:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:18:50.552000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:18:53.133685 kubelet[2467]: E1002 19:18:53.133644    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:18:53.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.37:22-10.200.12.6:47338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:18:53.451093 systemd[1]: Started sshd@8-10.200.8.37:22-10.200.12.6:47338.service.
Oct  2 19:18:53.497519 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.onfc7a.mount: Deactivated successfully.
Oct  2 19:18:53.604000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:53.609922 kernel: kauditd_printk_skb: 15 callbacks suppressed
Oct  2 19:18:53.610033 kernel: audit: type=1400 audit(1696274333.604:1385): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:53.604000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:53.642582 kernel: audit: type=1400 audit(1696274333.604:1384): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:53.642689 kernel: audit: type=1300 audit(1696274333.604:1384): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e26fa0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e26fa0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:53.680875 kernel: audit: type=1327 audit(1696274333.604:1384): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:53.681064 kernel: audit: type=1400 audit(1696274333.604:1386): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:53.604000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:53.699470 kernel: audit: type=1300 audit(1696274333.604:1386): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e270c0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e270c0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:53.721057 kernel: audit: type=1327 audit(1696274333.604:1386): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:53.605000 audit[2288]: AVC avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:53.754395 kernel: audit: type=1400 audit(1696274333.605:1387): avc:  denied  { watch } for  pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:18:53.605000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e271e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:53.754964 kernel: audit: type=1300 audit(1696274333.605:1387): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e271e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:53.776649 kernel: audit: type=1327 audit(1696274333.605:1387): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:53.605000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002da3180 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:18:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:18:54.099000 audit[5814]: USER_ACCT pid=5814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:54.102093 sshd[5814]: Accepted publickey for core from 10.200.12.6 port 47338 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:18:54.101000 audit[5814]: CRED_ACQ pid=5814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:54.101000 audit[5814]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b087960 a2=3 a3=0 items=0 ppid=1 pid=5814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:18:54.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:18:54.103438 sshd[5814]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:18:54.108814 systemd[1]: Started session-11.scope.
Oct  2 19:18:54.109444 systemd-logind[1290]: New session 11 of user core.
Oct  2 19:18:54.112000 audit[5814]: USER_START pid=5814 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:54.114000 audit[5857]: CRED_ACQ pid=5857 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:54.288817 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.AyB0By.mount: Deactivated successfully.
Oct  2 19:18:54.649705 sshd[5814]: pam_unix(sshd:session): session closed for user core
Oct  2 19:18:54.649000 audit[5814]: USER_END pid=5814 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:54.649000 audit[5814]: CRED_DISP pid=5814 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:18:54.653199 systemd[1]: sshd@8-10.200.8.37:22-10.200.12.6:47338.service: Deactivated successfully.
Oct  2 19:18:54.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.37:22-10.200.12.6:47338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:18:54.654388 systemd[1]: session-11.scope: Deactivated successfully.
Oct  2 19:18:54.655169 systemd-logind[1290]: Session 11 logged out. Waiting for processes to exit.
Oct  2 19:18:54.656023 systemd-logind[1290]: Removed session 11.
Oct  2 19:18:55.134830 kubelet[2467]: E1002 19:18:55.134460    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:19:02.134094 kubelet[2467]: E1002 19:19:02.134055    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:19:03.296306 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.WanFkd.mount: Deactivated successfully.
Oct  2 19:19:04.289392 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.EBPvwJ.mount: Deactivated successfully.
Oct  2 19:19:04.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.37:22-10.200.12.6:48058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:04.755371 systemd[1]: Started sshd@9-10.200.8.37:22-10.200.12.6:48058.service.
Oct  2 19:19:04.760615 kernel: kauditd_printk_skb: 12 callbacks suppressed
Oct  2 19:19:04.760783 kernel: audit: type=1130 audit(1696274344.754:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.37:22-10.200.12.6:48058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:05.133525 kubelet[2467]: E1002 19:19:05.133333    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:19:05.382000 audit[5933]: USER_ACCT pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.383639 sshd[5933]: Accepted publickey for core from 10.200.12.6 port 48058 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:19:05.401000 audit[5933]: CRED_ACQ pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.402615 sshd[5933]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:19:05.408108 systemd[1]: Started session-12.scope.
Oct  2 19:19:05.408887 systemd-logind[1290]: New session 12 of user core.
Oct  2 19:19:05.419611 kernel: audit: type=1101 audit(1696274345.382:1397): pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.419732 kernel: audit: type=1103 audit(1696274345.401:1398): pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.419763 kernel: audit: type=1006 audit(1696274345.401:1399): pid=5933 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1
Oct  2 19:19:05.401000 audit[5933]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6bf97a20 a2=3 a3=0 items=0 ppid=1 pid=5933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:05.448092 kernel: audit: type=1300 audit(1696274345.401:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6bf97a20 a2=3 a3=0 items=0 ppid=1 pid=5933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:05.401000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:19:05.448968 kernel: audit: type=1327 audit(1696274345.401:1399): proctitle=737368643A20636F7265205B707269765D
Oct  2 19:19:05.413000 audit[5933]: USER_START pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.455008 kernel: audit: type=1105 audit(1696274345.413:1400): pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.415000 audit[5935]: CRED_ACQ pid=5935 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.490782 kernel: audit: type=1103 audit(1696274345.415:1401): pid=5935 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.918359 sshd[5933]: pam_unix(sshd:session): session closed for user core
Oct  2 19:19:05.919000 audit[5933]: USER_END pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.922518 systemd-logind[1290]: Session 12 logged out. Waiting for processes to exit.
Oct  2 19:19:05.925647 systemd[1]: sshd@9-10.200.8.37:22-10.200.12.6:48058.service: Deactivated successfully.
Oct  2 19:19:05.926430 systemd[1]: session-12.scope: Deactivated successfully.
Oct  2 19:19:05.927820 systemd-logind[1290]: Removed session 12.
Oct  2 19:19:05.919000 audit[5933]: CRED_DISP pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.954929 kernel: audit: type=1106 audit(1696274345.919:1402): pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.955058 kernel: audit: type=1104 audit(1696274345.919:1403): pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:05.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.37:22-10.200.12.6:48058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:06.024534 systemd[1]: Started sshd@10-10.200.8.37:22-10.200.12.6:48074.service.
Oct  2 19:19:06.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.37:22-10.200.12.6:48074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:06.641000 audit[5947]: USER_ACCT pid=5947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:06.642226 sshd[5947]: Accepted publickey for core from 10.200.12.6 port 48074 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:19:06.643628 sshd[5947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:19:06.642000 audit[5947]: CRED_ACQ pid=5947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:06.642000 audit[5947]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0417c760 a2=3 a3=0 items=0 ppid=1 pid=5947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:06.642000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:19:06.648969 systemd[1]: Started session-13.scope.
Oct  2 19:19:06.649410 systemd-logind[1290]: New session 13 of user core.
Oct  2 19:19:06.653000 audit[5947]: USER_START pid=5947 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:06.654000 audit[5951]: CRED_ACQ pid=5951 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:07.134524 kubelet[2467]: E1002 19:19:07.134411    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:19:07.929829 sshd[5947]: pam_unix(sshd:session): session closed for user core
Oct  2 19:19:07.930000 audit[5947]: USER_END pid=5947 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:07.930000 audit[5947]: CRED_DISP pid=5947 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:07.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.37:22-10.200.12.6:48074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:07.933187 systemd[1]: sshd@10-10.200.8.37:22-10.200.12.6:48074.service: Deactivated successfully.
Oct  2 19:19:07.934769 systemd-logind[1290]: Session 13 logged out. Waiting for processes to exit.
Oct  2 19:19:07.934856 systemd[1]: session-13.scope: Deactivated successfully.
Oct  2 19:19:07.936181 systemd-logind[1290]: Removed session 13.
Oct  2 19:19:08.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.37:22-10.200.12.6:36182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:08.038300 systemd[1]: Started sshd@11-10.200.8.37:22-10.200.12.6:36182.service.
Oct  2 19:19:08.663000 audit[5961]: USER_ACCT pid=5961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:08.664911 sshd[5961]: Accepted publickey for core from 10.200.12.6 port 36182 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:19:08.665000 audit[5961]: CRED_ACQ pid=5961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:08.665000 audit[5961]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd646d1730 a2=3 a3=0 items=0 ppid=1 pid=5961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:08.665000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:19:08.666409 sshd[5961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:19:08.671529 systemd[1]: Started session-14.scope.
Oct  2 19:19:08.672042 systemd-logind[1290]: New session 14 of user core.
Oct  2 19:19:08.675000 audit[5961]: USER_START pid=5961 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:08.677000 audit[5963]: CRED_ACQ pid=5963 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:09.203417 sshd[5961]: pam_unix(sshd:session): session closed for user core
Oct  2 19:19:09.204000 audit[5961]: USER_END pid=5961 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:09.204000 audit[5961]: CRED_DISP pid=5961 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:09.206907 systemd[1]: sshd@11-10.200.8.37:22-10.200.12.6:36182.service: Deactivated successfully.
Oct  2 19:19:09.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.37:22-10.200.12.6:36182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:09.208138 systemd[1]: session-14.scope: Deactivated successfully.
Oct  2 19:19:09.209052 systemd-logind[1290]: Session 14 logged out. Waiting for processes to exit.
Oct  2 19:19:09.209899 systemd-logind[1290]: Removed session 14.
Oct  2 19:19:13.525217 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.03qbHz.mount: Deactivated successfully.
Oct  2 19:19:14.133807 kubelet[2467]: E1002 19:19:14.133774    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:19:19.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.37:22-10.200.12.6:59592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:19.315397 systemd[1]: Started sshd@12-10.200.8.37:22-10.200.12.6:59592.service.
Oct  2 19:19:19.320595 kernel: kauditd_printk_skb: 23 callbacks suppressed
Oct  2 19:19:19.320692 kernel: audit: type=1130 audit(1696274359.314:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.37:22-10.200.12.6:59592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:19.938000 audit[6041]: USER_ACCT pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:19.940982 sshd[6041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:19:19.958731 sshd[6041]: Accepted publickey for core from 10.200.12.6 port 59592 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:19:19.958971 kernel: audit: type=1101 audit(1696274359.938:1424): pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:19.939000 audit[6041]: CRED_ACQ pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:19.963496 systemd[1]: Started session-15.scope.
Oct  2 19:19:19.963989 systemd-logind[1290]: New session 15 of user core.
Oct  2 19:19:19.982083 kernel: audit: type=1103 audit(1696274359.939:1425): pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:19.939000 audit[6041]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0643b00 a2=3 a3=0 items=0 ppid=1 pid=6041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:20.010011 kernel: audit: type=1006 audit(1696274359.939:1426): pid=6041 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1
Oct  2 19:19:20.010177 kernel: audit: type=1300 audit(1696274359.939:1426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0643b00 a2=3 a3=0 items=0 ppid=1 pid=6041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:19.939000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:19:20.011014 kernel: audit: type=1327 audit(1696274359.939:1426): proctitle=737368643A20636F7265205B707269765D
Oct  2 19:19:19.969000 audit[6041]: USER_START pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:20.016988 kernel: audit: type=1105 audit(1696274359.969:1427): pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:19.971000 audit[6043]: CRED_ACQ pid=6043 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:20.035013 kernel: audit: type=1103 audit(1696274359.971:1428): pid=6043 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:20.134810 kubelet[2467]: E1002 19:19:20.134726    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:19:20.515027 sshd[6041]: pam_unix(sshd:session): session closed for user core
Oct  2 19:19:20.541988 kernel: audit: type=1106 audit(1696274360.515:1429): pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:20.542067 kernel: audit: type=1104 audit(1696274360.515:1430): pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:20.515000 audit[6041]: USER_END pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:20.515000 audit[6041]: CRED_DISP pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:20.518905 systemd-logind[1290]: Session 15 logged out. Waiting for processes to exit.
Oct  2 19:19:20.520381 systemd[1]: sshd@12-10.200.8.37:22-10.200.12.6:59592.service: Deactivated successfully.
Oct  2 19:19:20.521304 systemd[1]: session-15.scope: Deactivated successfully.
Oct  2 19:19:20.522903 systemd-logind[1290]: Removed session 15.
Oct  2 19:19:20.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.37:22-10.200.12.6:59592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:21.133482 kubelet[2467]: E1002 19:19:21.133391    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:19:23.499995 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.lncTHo.mount: Deactivated successfully.
Oct  2 19:19:24.288859 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.XdTgcm.mount: Deactivated successfully.
Oct  2 19:19:29.133765 kubelet[2467]: E1002 19:19:29.133725    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:19:30.621217 systemd[1]: Started sshd@13-10.200.8.37:22-10.200.12.6:42466.service.
Oct  2 19:19:30.644790 kernel: kauditd_printk_skb: 1 callbacks suppressed
Oct  2 19:19:30.644907 kernel: audit: type=1130 audit(1696274370.621:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.37:22-10.200.12.6:42466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:30.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.37:22-10.200.12.6:42466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:31.240000 audit[6122]: USER_ACCT pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:31.260597 sshd[6122]: Accepted publickey for core from 10.200.12.6 port 42466 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8
Oct  2 19:19:31.260852 sshd[6122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:19:31.261166 kernel: audit: type=1101 audit(1696274371.240:1433): pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:31.259000 audit[6122]: CRED_ACQ pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:31.267229 systemd[1]: Started session-16.scope.
Oct  2 19:19:31.267993 systemd-logind[1290]: New session 16 of user core.
Oct  2 19:19:31.280012 kernel: audit: type=1103 audit(1696274371.259:1434): pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:31.259000 audit[6122]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6e0d27d0 a2=3 a3=0 items=0 ppid=1 pid=6122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:31.290990 kernel: audit: type=1006 audit(1696274371.259:1435): pid=6122 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1
Oct  2 19:19:31.291043 kernel: audit: type=1300 audit(1696274371.259:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6e0d27d0 a2=3 a3=0 items=0 ppid=1 pid=6122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:31.310358 kernel: audit: type=1327 audit(1696274371.259:1435): proctitle=737368643A20636F7265205B707269765D
Oct  2 19:19:31.259000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:19:31.273000 audit[6122]: USER_START pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:31.316968 kernel: audit: type=1105 audit(1696274371.273:1436): pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:31.335013 kernel: audit: type=1103 audit(1696274371.275:1437): pid=6128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:31.275000 audit[6128]: CRED_ACQ pid=6128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:32.076925 sshd[6122]: pam_unix(sshd:session): session closed for user core
Oct  2 19:19:32.077000 audit[6122]: USER_END pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:32.080277 systemd[1]: sshd@13-10.200.8.37:22-10.200.12.6:42466.service: Deactivated successfully.
Oct  2 19:19:32.081098 systemd[1]: session-16.scope: Deactivated successfully.
Oct  2 19:19:32.082519 systemd-logind[1290]: Session 16 logged out. Waiting for processes to exit.
Oct  2 19:19:32.083396 systemd-logind[1290]: Removed session 16.
Oct  2 19:19:32.077000 audit[6122]: CRED_DISP pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:32.101972 kernel: audit: type=1106 audit(1696274372.077:1438): pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:32.102019 kernel: audit: type=1104 audit(1696274372.077:1439): pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 19:19:32.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.37:22-10.200.12.6:42466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:19:32.134684 kubelet[2467]: E1002 19:19:32.134650    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:19:32.135377 kubelet[2467]: E1002 19:19:32.135354    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:19:33.295790 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.ssUjPz.mount: Deactivated successfully.
Oct  2 19:19:34.288176 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.sNmvMK.mount: Deactivated successfully.
Oct  2 19:19:43.133697 env[1311]: time="2023-10-02T19:19:43.133646146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 19:19:43.452816 env[1311]: time="2023-10-02T19:19:43.452660880Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:19:43.458090 env[1311]: time="2023-10-02T19:19:43.458035070Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:19:43.458350 kubelet[2467]: E1002 19:19:43.458325    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:19:43.458726 kubelet[2467]: E1002 19:19:43.458376    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:19:43.458726 kubelet[2467]: E1002 19:19:43.458500    2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:19:43.459333 env[1311]: time="2023-10-02T19:19:43.459301091Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 19:19:43.523870 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.6M8Yiz.mount: Deactivated successfully.
Oct  2 19:19:43.755217 env[1311]: time="2023-10-02T19:19:43.755067737Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:19:43.760231 env[1311]: time="2023-10-02T19:19:43.760117221Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:19:43.760930 kubelet[2467]: E1002 19:19:43.760582    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:19:43.760930 kubelet[2467]: E1002 19:19:43.760637    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:19:43.760930 kubelet[2467]: E1002 19:19:43.760742    2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:19:43.760930 kubelet[2467]: E1002 19:19:43.760820    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:19:44.133821 env[1311]: time="2023-10-02T19:19:44.133723158Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:19:44.437770 env[1311]: time="2023-10-02T19:19:44.437610217Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:19:44.442461 env[1311]: time="2023-10-02T19:19:44.442336595Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:19:44.442770 kubelet[2467]: E1002 19:19:44.442739    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:19:44.442890 kubelet[2467]: E1002 19:19:44.442786    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:19:44.442978 kubelet[2467]: E1002 19:19:44.442927    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:19:44.443116 kubelet[2467]: E1002 19:19:44.443001    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:19:45.133674 kubelet[2467]: E1002 19:19:45.133638    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:19:46.297375 systemd[1]: cri-containerd-2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324.scope: Deactivated successfully.
Oct  2 19:19:46.297695 systemd[1]: cri-containerd-2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324.scope: Consumed 3.152s CPU time.
Oct  2 19:19:46.298000 audit: BPF prog-id=77 op=UNLOAD
Oct  2 19:19:46.305053 kernel: kauditd_printk_skb: 1 callbacks suppressed
Oct  2 19:19:46.305130 kernel: audit: type=1334 audit(1696274386.298:1441): prog-id=77 op=UNLOAD
Oct  2 19:19:46.298000 audit: BPF prog-id=101 op=UNLOAD
Oct  2 19:19:46.316270 kernel: audit: type=1334 audit(1696274386.298:1442): prog-id=101 op=UNLOAD
Oct  2 19:19:46.327840 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324-rootfs.mount: Deactivated successfully.
Oct  2 19:19:46.385682 env[1311]: time="2023-10-02T19:19:46.385612609Z" level=info msg="shim disconnected" id=2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324
Oct  2 19:19:46.385682 env[1311]: time="2023-10-02T19:19:46.385678710Z" level=warning msg="cleaning up after shim disconnected" id=2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324 namespace=k8s.io
Oct  2 19:19:46.385682 env[1311]: time="2023-10-02T19:19:46.385692111Z" level=info msg="cleaning up dead shim"
Oct  2 19:19:46.394667 env[1311]: time="2023-10-02T19:19:46.394621858Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6282 runtime=io.containerd.runc.v2\n"
Oct  2 19:19:46.704480 kubelet[2467]: I1002 19:19:46.704445    2467 scope.go:115] "RemoveContainer" containerID="2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324"
Oct  2 19:19:46.706694 env[1311]: time="2023-10-02T19:19:46.706646305Z" level=info msg="CreateContainer within sandbox \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}"
Oct  2 19:19:46.718062 systemd[1]: cri-containerd-aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d.scope: Deactivated successfully.
Oct  2 19:19:46.716000 audit: BPF prog-id=118 op=UNLOAD
Oct  2 19:19:46.718396 systemd[1]: cri-containerd-aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d.scope: Consumed 2.904s CPU time.
Oct  2 19:19:46.725011 kernel: audit: type=1334 audit(1696274386.716:1443): prog-id=118 op=UNLOAD
Oct  2 19:19:46.725000 audit: BPF prog-id=121 op=UNLOAD
Oct  2 19:19:46.733969 kernel: audit: type=1334 audit(1696274386.725:1444): prog-id=121 op=UNLOAD
Oct  2 19:19:46.740653 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2579578273.mount: Deactivated successfully.
Oct  2 19:19:46.757075 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d-rootfs.mount: Deactivated successfully.
Oct  2 19:19:46.764487 env[1311]: time="2023-10-02T19:19:46.764436758Z" level=info msg="CreateContainer within sandbox \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"64b0065cdb7e6c78350a15be425c1717ee3128312ec5d98d8b8376693ebd1493\""
Oct  2 19:19:46.766892 env[1311]: time="2023-10-02T19:19:46.765020968Z" level=info msg="StartContainer for \"64b0065cdb7e6c78350a15be425c1717ee3128312ec5d98d8b8376693ebd1493\""
Oct  2 19:19:46.774431 kubelet[2467]: E1002 19:19:46.774404    2467 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.37:41374->10.200.8.24:2379: read: connection timed out
Oct  2 19:19:46.776275 env[1311]: time="2023-10-02T19:19:46.775660744Z" level=info msg="shim disconnected" id=aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d
Oct  2 19:19:46.776275 env[1311]: time="2023-10-02T19:19:46.775733245Z" level=warning msg="cleaning up after shim disconnected" id=aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d namespace=k8s.io
Oct  2 19:19:46.776275 env[1311]: time="2023-10-02T19:19:46.775746945Z" level=info msg="cleaning up dead shim"
Oct  2 19:19:46.789961 env[1311]: time="2023-10-02T19:19:46.789898578Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6314 runtime=io.containerd.runc.v2\n"
Oct  2 19:19:46.795273 systemd[1]: Started cri-containerd-64b0065cdb7e6c78350a15be425c1717ee3128312ec5d98d8b8376693ebd1493.scope.
Oct  2 19:19:46.808000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.839364 kernel: audit: type=1400 audit(1696274386.808:1445): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.839500 kernel: audit: type=1400 audit(1696274386.808:1446): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.808000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.852830 kernel: audit: type=1400 audit(1696274386.808:1447): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.808000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.808000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.879077 kernel: audit: type=1400 audit(1696274386.808:1448): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.879188 kernel: audit: type=1400 audit(1696274386.808:1449): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.808000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.808000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.892597 kernel: audit: type=1400 audit(1696274386.808:1450): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.808000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.808000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.808000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.824000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.824000 audit: BPF prog-id=183 op=LOAD
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:46.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:46.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.825000 audit: BPF prog-id=184 op=LOAD
Oct  2 19:19:46.825000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d2620 items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:46.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit: BPF prog-id=185 op=LOAD
Oct  2 19:19:46.837000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d2668 items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:46.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331
Oct  2 19:19:46.837000 audit: BPF prog-id=185 op=UNLOAD
Oct  2 19:19:46.837000 audit: BPF prog-id=184 op=UNLOAD
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { perfmon } for  pid=6315 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit[6315]: AVC avc:  denied  { bpf } for  pid=6315 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:46.837000 audit: BPF prog-id=186 op=LOAD
Oct  2 19:19:46.837000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d2a78 items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:46.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331
Oct  2 19:19:46.930386 env[1311]: time="2023-10-02T19:19:46.930335595Z" level=info msg="StartContainer for \"64b0065cdb7e6c78350a15be425c1717ee3128312ec5d98d8b8376693ebd1493\" returns successfully"
Oct  2 19:19:47.467000 audit[6340]: AVC avc:  denied  { watch } for  pid=6340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:19:47.467000 audit[6340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0000566f0 a2=fc6 a3=0 items=0 ppid=2148 pid=6340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:19:47.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:19:47.468000 audit[6340]: AVC avc:  denied  { watch } for  pid=6340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:19:47.468000 audit[6340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ae2040 a2=fc6 a3=0 items=0 ppid=2148 pid=6340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null)
Oct  2 19:19:47.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:19:47.710400 kubelet[2467]: I1002 19:19:47.710368    2467 scope.go:115] "RemoveContainer" containerID="aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d"
Oct  2 19:19:47.712270 env[1311]: time="2023-10-02T19:19:47.712224341Z" level=info msg="CreateContainer within sandbox \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}"
Oct  2 19:19:47.739797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount482928318.mount: Deactivated successfully.
Oct  2 19:19:47.757249 env[1311]: time="2023-10-02T19:19:47.757147179Z" level=info msg="CreateContainer within sandbox \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"8e376fc37a6f236d413b473b6d2de6bcb06435179f12b2c205d4a63dcb20cfdb\""
Oct  2 19:19:47.758266 env[1311]: time="2023-10-02T19:19:47.758186396Z" level=info msg="StartContainer for \"8e376fc37a6f236d413b473b6d2de6bcb06435179f12b2c205d4a63dcb20cfdb\""
Oct  2 19:19:47.779206 systemd[1]: Started cri-containerd-8e376fc37a6f236d413b473b6d2de6bcb06435179f12b2c205d4a63dcb20cfdb.scope.
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.794000 audit: BPF prog-id=187 op=LOAD
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit: BPF prog-id=188 op=LOAD
Oct  2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001cc1d0 items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit: BPF prog-id=189 op=LOAD
Oct  2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001cc218 items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465
Oct  2 19:19:47.795000 audit: BPF prog-id=189 op=UNLOAD
Oct  2 19:19:47.795000 audit: BPF prog-id=188 op=UNLOAD
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { perfmon } for  pid=6377 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit[6377]: AVC avc:  denied  { bpf } for  pid=6377 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:47.795000 audit: BPF prog-id=190 op=LOAD
Oct  2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001cc628 items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465
Oct  2 19:19:47.800790 kubelet[2467]: E1002 19:19:47.798064    2467 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33.178a608f1527e3cc", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33", UID:"0e9923d274f84de35f2a55d22e743214", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 19, 37, 309938636, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 19, 37, 309938636, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.37:41192->10.200.8.24:2379: read: connection timed out' (will not retry!)
Oct  2 19:19:47.820211 env[1311]: time="2023-10-02T19:19:47.820165714Z" level=info msg="StartContainer for \"8e376fc37a6f236d413b473b6d2de6bcb06435179f12b2c205d4a63dcb20cfdb\" returns successfully"
Oct  2 19:19:50.466000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:19:50.466000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c013e77170 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:19:50.466000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:19:50.485000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:19:50.485000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c013e77290 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:19:50.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:19:50.500000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:19:50.500000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00e59f840 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:19:50.500000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:19:50.501000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:19:50.501000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c013fc2f60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:19:50.501000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:19:50.553000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:19:50.553000 audit[2343]: AVC avc:  denied  { watch } for  pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:19:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00e59f880 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:19:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:19:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c013fc30e0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null)
Oct  2 19:19:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265
Oct  2 19:19:51.918411 systemd[1]: cri-containerd-92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966.scope: Deactivated successfully.
Oct  2 19:19:51.918732 systemd[1]: cri-containerd-92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966.scope: Consumed 1.322s CPU time.
Oct  2 19:19:51.921000 audit: BPF prog-id=85 op=UNLOAD
Oct  2 19:19:51.929725 kernel: kauditd_printk_skb: 132 callbacks suppressed
Oct  2 19:19:51.929821 kernel: audit: type=1334 audit(1696274391.921:1489): prog-id=85 op=UNLOAD
Oct  2 19:19:51.937515 kernel: audit: type=1334 audit(1696274391.921:1490): prog-id=92 op=UNLOAD
Oct  2 19:19:51.921000 audit: BPF prog-id=92 op=UNLOAD
Oct  2 19:19:51.943261 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966-rootfs.mount: Deactivated successfully.
Oct  2 19:19:52.022029 env[1311]: time="2023-10-02T19:19:52.021685401Z" level=info msg="shim disconnected" id=92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966
Oct  2 19:19:52.022029 env[1311]: time="2023-10-02T19:19:52.021737602Z" level=warning msg="cleaning up after shim disconnected" id=92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966 namespace=k8s.io
Oct  2 19:19:52.022029 env[1311]: time="2023-10-02T19:19:52.021750902Z" level=info msg="cleaning up dead shim"
Oct  2 19:19:52.031236 env[1311]: time="2023-10-02T19:19:52.031194454Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6419 runtime=io.containerd.runc.v2\n"
Oct  2 19:19:52.726118 kubelet[2467]: I1002 19:19:52.726088    2467 scope.go:115] "RemoveContainer" containerID="92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966"
Oct  2 19:19:52.728218 env[1311]: time="2023-10-02T19:19:52.728172758Z" level=info msg="CreateContainer within sandbox \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}"
Oct  2 19:19:52.759144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3096708193.mount: Deactivated successfully.
Oct  2 19:19:52.776060 env[1311]: time="2023-10-02T19:19:52.776011427Z" level=info msg="CreateContainer within sandbox \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"654499c01c67a3f261d3ea86e117d924d0762b0b696b80b31ecfb59cba1d3b20\""
Oct  2 19:19:52.776484 env[1311]: time="2023-10-02T19:19:52.776454134Z" level=info msg="StartContainer for \"654499c01c67a3f261d3ea86e117d924d0762b0b696b80b31ecfb59cba1d3b20\""
Oct  2 19:19:52.795326 systemd[1]: Started cri-containerd-654499c01c67a3f261d3ea86e117d924d0762b0b696b80b31ecfb59cba1d3b20.scope.
Oct  2 19:19:52.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838935 kernel: audit: type=1400 audit(1696274392.809:1491): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839078 kernel: audit: type=1400 audit(1696274392.809:1492): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.858000 kernel: audit: type=1400 audit(1696274392.809:1493): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.886206 kernel: audit: type=1400 audit(1696274392.809:1494): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.886293 kernel: audit: type=1400 audit(1696274392.809:1495): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.886317 kernel: audit: type=1400 audit(1696274392.809:1496): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.912590 kernel: audit: type=1400 audit(1696274392.809:1497): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.926766 kernel: audit: type=1400 audit(1696274392.809:1498): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit: BPF prog-id=191 op=LOAD
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:52.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:52.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.838000 audit: BPF prog-id=192 op=LOAD
Oct  2 19:19:52.838000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00021da60 items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:52.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit: BPF prog-id=193 op=LOAD
Oct  2 19:19:52.839000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00021daa8 items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:52.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764
Oct  2 19:19:52.839000 audit: BPF prog-id=193 op=UNLOAD
Oct  2 19:19:52.839000 audit: BPF prog-id=192 op=UNLOAD
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { perfmon } for  pid=6439 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit[6439]: AVC avc:  denied  { bpf } for  pid=6439 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:19:52.839000 audit: BPF prog-id=194 op=LOAD
Oct  2 19:19:52.839000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00021deb8 items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:19:52.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764
Oct  2 19:19:52.934668 env[1311]: time="2023-10-02T19:19:52.934620877Z" level=info msg="StartContainer for \"654499c01c67a3f261d3ea86e117d924d0762b0b696b80b31ecfb59cba1d3b20\" returns successfully"
Oct  2 19:19:53.507109 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.gZUdHA.mount: Deactivated successfully.
Oct  2 19:19:56.775469 kubelet[2467]: E1002 19:19:56.775413    2467 controller.go:189] failed to update lease, error: Put "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)
Oct  2 19:19:57.133796 kubelet[2467]: E1002 19:19:57.133771    2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee
Oct  2 19:19:58.134169 env[1311]: time="2023-10-02T19:19:58.134100132Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:19:58.135834 kubelet[2467]: E1002 19:19:58.135720    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a
Oct  2 19:19:58.436719 env[1311]: time="2023-10-02T19:19:58.436478377Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:19:58.439470 env[1311]: time="2023-10-02T19:19:58.439403923Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:19:58.439713 kubelet[2467]: E1002 19:19:58.439683    2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:19:58.439814 kubelet[2467]: E1002 19:19:58.439739    2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:19:58.439903 kubelet[2467]: E1002 19:19:58.439880    2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:19:58.440107 kubelet[2467]: E1002 19:19:58.439960    2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f
Oct  2 19:20:03.549525 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.nZU5Vn.mount: Deactivated successfully.
Oct  2 19:20:06.776293 kubelet[2467]: E1002 19:20:06.776047    2467 controller.go:189] failed to update lease, error: Put "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": context deadline exceeded (Client.Timeout exceeded while awaiting headers)