target torcx.target. [ OK ] Reached target torcx.target. [ 19.766258] systemd[1]: Reached target veritysetup.target. [ OK ] Reached target veritysetup.target. [ 19.772412] systemd[1]: Listening on systemd-coredump.socket. [ OK ] Listening on systemd-coredump.socket. [ 19.776648] systemd[1]: Listening on systemd-initctl.socket. [ OK ] Listening on systemd-initctl.socket. [ 19.780869] systemd[1]: Listening on systemd-networkd.socket. [ OK ] Listening on systemd-networkd.socket. [ 19.785309] systemd[1]: Listening on systemd-udevd-control.socket. [ OK ] Listening on systemd-udevd-control.socket. [ 19.790186] systemd[1]: Listening on systemd-udevd-kernel.socket. [ OK ] Listening on systemd-udevd-kernel.socket. [ 19.794700] systemd[1]: Listening on systemd-userdbd.socket. [ OK ] Listening on systemd-userdbd.socket. [ 19.801093] systemd[1]: Mounting dev-hugepages.mount... Mounting dev-hugepages.mount... [ 19.806992] systemd[1]: Mounting dev-mqueue.mount... Mounting dev-mqueue.mount... [ 19.812711] systemd[1]: Mounting media.mount... Mounting media.mount... [ 19.826901] systemd[1]: Mounting sys-kernel-debug.mount... Mounting sys-kernel-debug.mount... [ 19.843593] systemd[1]: Mounting sys-kernel-tracing.mount... Mounting sys-kernel-tracing.mount... [ 19.849782] systemd[1]: Mounting tmp.mount... Mounting tmp.mount... [ 19.860639] systemd[1]: Starting flatcar-tmpfiles.service... Starting flatcar-tmpfiles.service... [ 19.864742] systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. [ 19.870950] systemd[1]: Starting kmod-static-nodes.service... Starting kmod-static-nodes.service... [ 19.879755] systemd[1]: Starting modprobe@configfs.service... Starting modprobe@configfs.service... [ 19.885666] systemd[1]: Starting modprobe@dm_mod.service... Starting modprobe@dm_mod.service... [ 19.894997] systemd[1]: Starting modprobe@drm.service... Starting modprobe@drm.service... [ 19.900467] systemd[1]: Starting modprobe@efi_pstore.service... Starting modprobe@efi_pstore.service... [ 19.906381] systemd[1]: Starting modprobe@fuse.service... Starting modprobe@fuse.service... [ 19.912192] systemd[1]: Starting modprobe@loop.service... Starting modprobe@loop.service... [ 19.917458] systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). [ 19.922105] systemd[1]: systemd-fsck-root.service: Deactivated successfully. [ 19.924856] systemd[1]: Stopped systemd-fsck-root.service. [ OK ] Stopped systemd-fsck-root.service. [ 19.931272] systemd[1]: systemd-fsck-usr.service: Deactivated successfully. [ 19.935230] systemd[1]: Stopped systemd-fsck-usr.service. [ OK ] Stopped systemd-fsck-usr.service. [ 19.939202] systemd[1]: Stopped systemd-journald.service. [ OK ] Stopped systemd-journald.service. [ 19.947696] systemd[1]: Starting systemd-journald.service... Starting systemd-journald.service... [ 19.954767] systemd[1]: Starting systemd-modules-load.service... Starting systemd-modules-load.service... [ 19.962686] systemd[1]: Starting systemd-network-generator.service... Starting systemd-network-generator.service... [ 19.969234] systemd[1]: Starting systemd-remount-fs.service... Starting systemd-remount-fs.service... [ 19.977433] systemd[1]: Starting systemd-udev-trigger.service... Starting systemd-udev-trigger.service... [ 19.982681] systemd[1]: verity-setup.service: Deactivated successfully. [ 19.985316] systemd[1]: Stopped verity-setup.service. [ OK ] Stopped verity-setup.service. [ 19.994909] systemd[1]: Mounted dev-hugepages.mount. [ OK ] Mounted dev-hugepages.mount. [ 20.001335] systemd[1]: Mounted dev-mqueue.mount. [ OK ] Mounted dev-mqueue.mount. [ 20.005309] systemd[1]: Mounted media.mount. [ OK ] Mounted media.mount. [ 20.008713] systemd[1]: Mounted sys-kernel-debug.mount. [ OK ] Mounted sys-kernel-debug.mount. [ 20.013440] systemd[1]: Mounted sys-kernel-tracing.mount. [ OK ] Mounted sys-kernel-tracing.mount. [ 20.017454] systemd[1]: Mounted tmp.mount. [ OK ] Mounted tmp.mount. [ 20.020972] systemd[1]: Finished kmod-static-nodes.service. [ OK ] Finished kmod-static-nodes.service. [ 20.027647] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 20.030547] systemd[1]: Finished modprobe@configfs.service. [ OK ] Finished modprobe@configfs.service. [ 20.035123] systemd[1]: modprobe@dm_mod.service: Deactivated successfully. [ 20.037981] systemd[1]: Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@dm_mod.service. [ 20.044758] systemd[1]: modprobe@drm.service: Deactivated successfully. [ 20.047677] systemd[1]: Finished modprobe@drm.service. [ OK ] Finished modprobe@drm.service. [ 20.054076] systemd[1]: Mounting sys-kernel-config.mount... Mounting sys-kernel-config.mount... [ 20.071035] systemd[1]: Finished systemd-network-generator.service. [ OK ] Finished systemd-network-generator.service. [ 20.076527] systemd[1]: Finished systemd-remount-fs.service. [ OK ] Finished systemd-remount-fs.service. [ 20.081023] systemd[1]: Mounted sys-kernel-config.mount. [ OK ] Mounted sys-kernel-config.mount. [ 20.085025] systemd[1]: Reached target network-pre.target. [ OK ] Reached target network-pre.target. [ 20.091076] systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). [ 20.098542] systemd[1]: Starting systemd-hwdb-update.service... Starting systemd-hwdb-update.service... [ 20.112644] systemd[1]: Starting systemd-random-seed.service... Starting systemd-random-seed.service... [ 20.117586] systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. [ 20.121327] systemd[1]: Finished modprobe@efi_pstore.service. [ OK ] Finished modprobe@efi_pstore.service. [ 20.126122] systemd[1]: Finished systemd-modules-load.service. [ OK ] Finished systemd-modules-load.service. [ 20.132789] systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). [ 20.141823] systemd[1]: Starting systemd-sysctl.service... Starting systemd-sysctl.service... [ 20.166644] fuse: init (API version 7.34) [ 20.175104] systemd[1]: modprobe@fuse.service: Deactivated successfully. [ 20.177897] systemd[1]: Finished modprobe@fuse.service. [ OK ] Finished modprobe@fuse.service. [ 20.184252] loop: module loaded [ 20.186004] systemd[1]: Mounting sys-fs-fuse-connections.mount... Mounting sys-fs-fuse-connections.mount... [ 20.198412] systemd[1]: Started systemd-journald.service. [ OK ] Started systemd-journald.service. [ OK ] Finished modprobe@loop.service. [ OK ] Mounted sys-fs-fuse-connections.mount. Starting systemd-journal-flush.service... [ OK ] Finished systemd-random-seed.service. [ OK ] Reached target first-boot-complete.target. [ 20.252775] systemd-journald[1506]: Received client request to flush runtime journal. [ OK ] Finished systemd-sysctl.service. [ OK ] Finished systemd-journal-flush.service. [ OK ] Finished systemd-udev-trigger.service. [ OK ] Finished flatcar-tmpfiles.service. Starting systemd-sysusers.service... Starting systemd-udev-settle.service... [ OK ] Finished systemd-sysusers.service. [ OK ] Finished systemd-hwdb-update.service. Starting systemd-udevd.service... [ OK ] Started systemd-udevd.service. Starting systemd-networkd.service... Starting systemd-userdbd.service... [ OK ] Started systemd-userdbd.service. [ OK ] Started systemd-networkd.service. Starting systemd-networkd-wait-online.service... [ 21.578581] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 21.722878] BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1571) [ OK ] Found device dev-disk-by\x2dlabel-OEM.device. [ OK ] Finished systemd-udev-settle.service. Starting lvm2-activation-early.service... [ OK ] Finished lvm2-activation-early.service. [ OK ] Reached target cryptsetup.target. Starting lvm2-activation.service... [ OK ] Finished lvm2-activation.service. [ OK ] Reached target local-fs-pre.target. [ OK ] Reached target local-fs.target. [ OK ] Reached target machines.target. Starting ldconfig.service... Starting systemd-boot-update.service... Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Starting systemd-machine-id-commit.service... Starting systemd-tmpfiles-setup.service... Starting systemd-fsck@dev-…label-EFI\x2dSYSTEM.service... [ OK ] Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. [ OK ] Finished systemd-fsck@dev-…2dlabel-EFI\x2dSYSTEM.service. Mounting boot.mount... [ OK ] Mounted boot.mount. [ OK ] Finished systemd-boot-update.service. [ OK ] Finished systemd-tmpfiles-setup.service. Starting audit-rules.service... Starting clean-ca-certificates.service... Starting systemd-journal-catalog-update.service... Starting systemd-resolved.service... Starting systemd-timesyncd.service... Starting systemd-update-utmp.service... [ OK ] Finished clean-ca-certificates.service. [ OK ] Finished systemd-update-utmp.service. [ OK ] Started systemd-timesyncd.service. [ OK ] Reached target time-set.target. [ OK ] Finished systemd-journal-catalog-update.service. [ OK ] Started systemd-resolved.service. [ OK ] Reached target network.target. [ OK ] Reached target nss-lookup.target. [ OK ] Finished audit-rules.service. [ OK ] Finished systemd-machine-id-commit.service. [ OK ] Finished systemd-networkd-wait-online.service. [ OK ] Reached target network-online.target. [ OK ] Finished ldconfig.service. Starting systemd-update-done.service... [ OK ] Finished systemd-update-done.service. [ OK ] Reached target sysinit.target. [ OK ] Started motdgen.path. [ OK ] Started user-cloudinit@var…car\x2dinstall-user_data.path. [ OK ] Started logrotate.timer. [ OK ] Started mdadm.timer. [ OK ] Started systemd-tmpfiles-clean.timer. [ OK ] Reached target paths.target. [ OK ] Reached target timers.target. [ OK ] Listening on dbus.socket. Starting docker.socket... [ OK ] Listening on sshd.socket. [ OK ] Listening on docker.socket. [ OK ] Reached target sockets.target. [ OK ] Reached target basic.target. [ OK ] Started amazon-ssm-agent.service. Starting containerd.service... Starting coreos-metadata-sshkeys@core.service... Starting dbus.service... Starting enable-oem-cloudinit.service... Starting extend-filesystems.service... Starting motdgen.service... [ OK ] Started nvidia.service. Starting prepare-cni-plugins.service... Starting prepare-critools.service... Starting ssh-key-proc-cmdline.service... Starting sshd-keygen.service... Starting systemd-logind.service... Starting update-engine.service... Starting update-ssh-keys-after-ignition.service... [ OK ] Finished ssh-key-proc-cmdline.service. [ OK ] Started dbus.service. [ OK ] Reached target system-config.target. [ OK ] Reached target user-config.target. Starting systemd-hostnamed.service... [ 23.886118] extend-filesystems[1728]: Found nvme0n1 [ 23.888457] extend-filesystems[1728]: Found nvme0n1p1 [ 23.893626] extend-filesystems[1728]: Found nvme0n1p2 [ 23.900330] extend-filesystems[1728]: Found nvme0n1p3 [ 23.904305] extend-filesystems[1728]: Found usr [ 23.906221] extend-filesystems[1728]: Found nvme0n1p4 [ 23.910308] extend-filesystems[1728]: Found nvme0n1p6 [ 23.912458] extend-filesystems[1728]: Found nvme0n1p7 [ 23.914890] extend-filesystems[1728]: Found nvme0n1p9 [ 23.917609] extend-filesystems[1728]: Checking size of /dev/nvme0n1p9 [ OK ] Created slice system-sshd.slice. [ OK ] Finished motdgen.service. [ 24.050988] extend-filesystems[1728]: Resized partition /dev/nvme0n1p9 [ OK ] Started update-engine.service. [ OK ] Started locksmithd.service. [ 24.069069] extend-filesystems[1784]: resize2fs 1.46.5 (30-Dec-2021) [ 24.209490] EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks [ 24.268752] EXT4-fs (nvme0n1p9): resized filesystem to 1489915 [ 24.185385] extend-filesystems[1784]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required [ 24.188369] extend-filesystems[1784]: old_desc_blocks = 1, new_desc_blocks = 1 [ 24.191251] extend-filesystems[1784]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. [ 24.194231] extend-filesystems[1728]: Resized filesystem in /dev/nvme0n1p9 [ OK ] Finished extend-filesystems.service. [ OK ] Finished update-ssh-keys-after-ignition.service. [ OK ] Started systemd-logind.service. [ OK ] Started systemd-hostnamed.service. Starting polkit.service... [ OK ] Started containerd.service. [ OK ] Started polkit.service. [ OK ] Finished coreos-metadata-sshkeys@core.service. [ OK ] Finished prepare-critools.service. [ OK ] Finished prepare-cni-plugins.service. [* ] Job sshd-keygen.service/start running (4s / no limit) M [** ] Job sshd-keygen.service/start running (5s / no limit) M [*** ] Job sshd-keygen.service/start running (5s / no limit) M [ *** ] Job sshd-keygen.service/start running (6s / no limit) M [ *** ] Job sshd-keygen.service/start running (7s / no limit) M [ ***] Job sshd-keygen.service/start running (7s / no limit) M [ **] Job sshd-keygen.service/start running (8s / no limit) M [ *] Job sshd-keygen.service/start running (8s / no limit) M [ OK ] Finished sshd-keygen.service.  Starting issuegen.service... [ OK ] Started sshd@0-172.31.21.4…2-139.178.89.65:50464.service. [ OK ] Finished issuegen.service. Starting systemd-user-sessions.service... [ OK ] Finished systemd-user-sessions.service. [ OK ] Started getty@tty1.service. [ OK ] Started serial-getty@ttyS0.service. [ OK ] Reached target getty.target. [ OK ] Reached target multi-user.target. Starting systemd-update-utmp-runlevel.service... [ OK ] Finished systemd-update-utmp-runlevel.service. This is ip-172-31-21-44 (Linux aarch64 5.15.132-flatcar) 18:49:52 SSH host key: SHA256:RjX8etNhMOgBKm32qYzlSWt+xdFbmV12zzJ5z4PSZBg (RSA) SSH host key: SHA256:nqZRmQBESv4mL8sPJeloR8BeJuu47IonT86+pr8O2oA (ECDSA) SSH host key: SHA256:9R4/VKQtfRJYYKurXfPt+dYJ1nWqJvdYOdh+XJ7SiJ0 (ED25519) eth0: 172.31.21.44 fe80::4dd:91ff:fe07:6519 ip-172-31-21-44 login: [ 35.673841] kauditd_printk_skb: 74 callbacks suppressed [ 35.673846] audit: type=1305 audit(1696272594.203:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 35.681109] audit: type=1300 audit(1696272594.203:162): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd94b5790 a2=420 a3=0 items=0 ppid=1 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 35.692127] audit: type=1327 audit(1696272594.203:162): proctitle=2F7362696E2F617564697463746C002D44 [ 35.697656] audit: type=1131 audit(1696272594.226:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 35.769129] audit: type=1130 audit(1696272594.299:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 35.777962] audit: type=1106 audit(1696272594.308:165): pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 35.787821] audit: type=1104 audit(1696272594.308:166): pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 35.811895] audit: type=1106 audit(1696272594.341:167): pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 35.824105] audit: type=1104 audit(1696272594.342:168): pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 35.833990] audit: type=1131 audit(1696272594.354:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.44:22-139.178.89.65:51430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 37.312083] Initializing XFRM netlink socket This is ip-172-31-21-44 (Linux aarch64 5.15.132-flatcar) 18:49:56 SSH host key: SHA256:RjX8etNhMOgBKm32qYzlSWt+xdFbmV12zzJ5z4PSZBg (RSA) SSH host key: SHA256:nqZRmQBESv4mL8sPJeloR8BeJuu47IonT86+pr8O2oA (ECDSA) SSH host key: SHA256:9R4/VKQtfRJYYKurXfPt+dYJ1nWqJvdYOdh+XJ7SiJ0 (ED25519) eth0: 172.31.21.44 fe80::4dd:91ff:fe07:6519 ip-172-31-21-44 login: [ 48.733184] kauditd_printk_skb: 292 callbacks suppressed [ 48.733190] audit: type=1130 audit(1696272607.313:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 48.746057] audit: type=1131 audit(1696272607.313:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 48.756469] audit: type=1130 audit(1696272607.317:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 48.968129] audit: type=1131 audit(1696272607.549:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 54.598718] audit: type=1131 audit(1696272613.186:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 54.626768] audit: type=1334 audit(1696272613.215:417): prog-id=41 op=UNLOAD [ 54.629499] audit: type=1334 audit(1696272613.215:418): prog-id=40 op=UNLOAD [ 54.632194] audit: type=1334 audit(1696272613.215:419): prog-id=39 op=UNLOAD [ 59.175104] audit: type=1130 audit(1696272617.770:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 59.193370] audit: type=1131 audit(1696272617.770:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 59.207336] audit: type=1130 audit(1696272617.791:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 59.362055] audit: type=1131 audit(1696272617.958:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 62.511754] audit: type=1130 audit(1696272621.114:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 62.519781] audit: type=1131 audit(1696272621.114:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 63.200660] audit: type=1400 audit(1696272621.803:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 63.208135] audit: type=1400 audit(1696272621.811:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 63.215988] audit: type=1400 audit(1696272621.811:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 63.223805] audit: type=1400 audit(1696272621.811:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 63.231637] audit: type=1400 audit(1696272621.811:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 63.239319] audit: type=1400 audit(1696272621.811:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 63.247138] audit: audit_backlog=65 > audit_backlog_limit=64 [ 63.247206] audit: type=1400 audit(1696272621.811:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.356135] kauditd_printk_skb: 595 callbacks suppressed [ 70.356140] audit: type=1400 audit(1696272628.967:702): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 70.371825] audit: type=1300 audit(1696272628.967:702): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4001099d40 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) [ 70.387821] audit: type=1327 audit(1696272628.967:702): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 [ 70.401587] audit: type=1400 audit(1696272628.979:703): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 70.415795] audit: type=1300 audit(1696272628.979:703): arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=4000e4a030 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) [ 70.431748] audit: type=1327 audit(1696272628.979:703): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 [ 70.443774] audit: type=1400 audit(1696272628.980:704): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 70.456730] audit: type=1300 audit(1696272628.980:704): arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=40082fef40 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) [ 70.472723] audit: type=1327 audit(1696272628.980:704): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 [ 70.484505] audit: type=1400 audit(1696272629.094:705): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 80.555316] kauditd_printk_skb: 272 callbacks suppressed [ 80.555322] audit: type=1106 audit(1696272639.174:959): pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 80.567231] audit: type=1104 audit(1696272639.174:960): pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 80.581017] audit: type=1106 audit(1696272639.199:961): pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 80.592564] audit: type=1104 audit(1696272639.199:962): pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 80.603596] audit: type=1131 audit(1696272639.212:963): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.44:22-139.178.89.65:51446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 84.746268] audit: type=1400 audit(1696272643.368:964): avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 84.755960] audit: type=1300 audit(1696272643.368:964): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f47780 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) [ 84.768815] audit: type=1327 audit(1696272643.368:964): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 84.779596] audit: type=1400 audit(1696272643.373:965): avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 84.789461] audit: type=1300 audit(1696272643.373:965): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f479a0 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) [ 85.553429] kauditd_printk_skb: 7 callbacks suppressed [ 85.553434] audit: type=1400 audit(1696272644.175:968): avc: denied { watch } for pid=2624 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 [ 85.566149] audit: type=1300 audit(1696272644.175:968): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c45280 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) [ 85.580201] audit: type=1327 audit(1696272644.175:968): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 89.201166] audit: type=1400 audit(1696272647.825:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.208743] audit: type=1400 audit(1696272647.825:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.216561] audit: type=1400 audit(1696272647.825:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.224322] audit: type=1400 audit(1696272647.825:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.234716] audit: type=1400 audit(1696272647.825:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.244794] audit: type=1400 audit(1696272647.825:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.252882] audit: type=1400 audit(1696272647.825:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.160551] kauditd_printk_skb: 303 callbacks suppressed [ 92.160556] audit: type=1400 audit(1696272650.786:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.171580] audit: type=1400 audit(1696272650.787:1063): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.182069] audit: type=1400 audit(1696272650.787:1064): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.191329] audit: type=1400 audit(1696272650.787:1065): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.205147] audit: type=1400 audit(1696272650.787:1066): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.214077] audit: type=1400 audit(1696272650.787:1067): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.222504] audit: type=1400 audit(1696272650.787:1068): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.230640] audit: type=1400 audit(1696272650.787:1069): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.240441] audit: type=1400 audit(1696272650.787:1070): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.248558] audit: type=1400 audit(1696272650.788:1071): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.510665] kauditd_printk_skb: 65 callbacks suppressed [ 97.510670] audit: type=1400 audit(1696272656.138:1086): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.524327] audit: type=1400 audit(1696272656.138:1087): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.533324] audit: type=1400 audit(1696272656.138:1088): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.546036] audit: type=1400 audit(1696272656.138:1089): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.555474] audit: type=1400 audit(1696272656.138:1090): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.563562] audit: type=1400 audit(1696272656.138:1091): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.571771] audit: type=1400 audit(1696272656.138:1092): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.580964] audit: type=1400 audit(1696272656.138:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.591062] audit: type=1400 audit(1696272656.138:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 97.599039] audit: type=1400 audit(1696272656.141:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.683496] kauditd_printk_skb: 211 callbacks suppressed [ 106.683502] audit: type=1400 audit(1696272665.314:1149): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.693724] audit: type=1300 audit(1696272665.314:1149): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=3293 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 106.706307] audit: type=1327 audit(1696272665.314:1149): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396663663731633139373364353631633337383034303264353833 [ 106.719120] audit: type=1400 audit(1696272665.314:1150): avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.728167] audit: type=1400 audit(1696272665.314:1150): avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.736543] audit: type=1400 audit(1696272665.314:1150): avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.744450] audit: type=1400 audit(1696272665.314:1150): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.753931] audit: type=1400 audit(1696272665.314:1150): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.762379] audit: type=1400 audit(1696272665.314:1150): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.770613] audit: type=1400 audit(1696272665.314:1150): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.554254] kauditd_printk_skb: 34 callbacks suppressed [ 116.554259] audit: type=1400 audit(1696272675.188:1156): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.565436] audit: type=1300 audit(1696272675.188:1156): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001cd5a0 a2=3c a3=0 items=0 ppid=3293 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 116.577148] audit: type=1327 audit(1696272675.188:1156): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376132386433323139623437663264336130323762323939326433 [ 116.588185] audit: type=1400 audit(1696272675.188:1157): avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.597248] audit: type=1400 audit(1696272675.188:1157): avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.607152] audit: type=1400 audit(1696272675.188:1157): avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.617794] audit: type=1400 audit(1696272675.188:1157): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.626244] audit: type=1400 audit(1696272675.188:1157): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.634923] audit: type=1400 audit(1696272675.188:1157): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.644176] audit: type=1400 audit(1696272675.188:1157): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.792729] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 116.795810] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. This is ip-172-31-21-44 (Linux aarch64 5.15.132-flatcar) 18:51:20 SSH host key: SHA256:RjX8etNhMOgBKm32qYzlSWt+xdFbmV12zzJ5z4PSZBg (RSA) SSH host key: SHA256:nqZRmQBESv4mL8sPJeloR8BeJuu47IonT86+pr8O2oA (ECDSA) SSH host key: SHA256:9R4/VKQtfRJYYKurXfPt+dYJ1nWqJvdYOdh+XJ7SiJ0 (ED25519) eth0: 172.31.21.44 fe80::4dd:91ff:fe07:6519 ip-172-31-21-44 login: [ 122.520328] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 122.522873] IPv6: ADDRCONF(NETDEV_CHANGE): cali08f5148be26: link becomes ready This is ip-172-31-21-44 (Linux aarch64 5.15.132-flatcar) 18:51:21 SSH host key: SHA256:RjX8etNhMOgBKm32qYzlSWt+xdFbmV12zzJ5z4PSZBg (RSA) SSH host key: SHA256:nqZRmQBESv4mL8sPJeloR8BeJuu47IonT86+pr8O2oA (ECDSA) SSH host key: SHA256:9R4/VKQtfRJYYKurXfPt+dYJ1nWqJvdYOdh+XJ7SiJ0 (ED25519) eth0: 172.31.21.44 fe80::4dd:91ff:fe07:6519 ip-172-31-21-44 login: [ 122.664597] IPv6: ADDRCONF(NETDEV_CHANGE): cali74763404732: link becomes ready [ 122.750415] kauditd_printk_skb: 129 callbacks suppressed [ 122.750420] audit: type=1325 audit(1696272681.382:1182): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" [ 122.758575] audit: type=1300 audit(1696272681.382:1182): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffe5d0d100 a2=0 a3=ffff99446fa0 items=0 ppid=3910 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 122.778774] audit: type=1327 audit(1696272681.382:1182): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 [ 122.855683] audit: type=1400 audit(1696272681.488:1183): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.864824] audit: type=1400 audit(1696272681.488:1184): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.880923] audit: type=1400 audit(1696272681.488:1185): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.892108] audit: type=1400 audit(1696272681.488:1186): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.899838] audit: type=1400 audit(1696272681.488:1187): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.909043] audit: type=1400 audit(1696272681.488:1188): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.920552] audit: type=1400 audit(1696272681.488:1189): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 124.642518] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 124.644987] IPv6: ADDRCONF(NETDEV_CHANGE): cali26d49725d2a: link becomes ready [ 124.807040] IPv6: ADDRCONF(NETDEV_CHANGE): calicac67bec16d: link becomes ready This is ip-172-31-21-44 (Linux aarch64 5.15.132-flatcar) 18:51:23 SSH host key: SHA256:RjX8etNhMOgBKm32qYzlSWt+xdFbmV12zzJ5z4PSZBg (RSA) SSH host key: SHA256:nqZRmQBESv4mL8sPJeloR8BeJuu47IonT86+pr8O2oA (ECDSA) SSH host key: SHA256:9R4/VKQtfRJYYKurXfPt+dYJ1nWqJvdYOdh+XJ7SiJ0 (ED25519) eth0: 172.31.21.44 fe80::4dd:91ff:fe07:6519 ip-172-31-21-44 login: This is ip-172-31-21-44 (Linux aarch64 5.15.132-flatcar) 18:51:24 SSH host key: SHA256:RjX8etNhMOgBKm32qYzlSWt+xdFbmV12zzJ5z4PSZBg (RSA) SSH host key: SHA256:nqZRmQBESv4mL8sPJeloR8BeJuu47IonT86+pr8O2oA (ECDSA) SSH host key: SHA256:9R4/VKQtfRJYYKurXfPt+dYJ1nWqJvdYOdh+XJ7SiJ0 (ED25519) eth0: 172.31.21.44 fe80::4dd:91ff:fe07:6519 ip-172-31-21-44 login: This is ip-172-31-21-44 (Linux aarch64 5.15.132-flatcar) 18:51:25 SSH host key: SHA256:RjX8etNhMOgBKm32qYzlSWt+xdFbmV12zzJ5z4PSZBg (RSA) SSH host key: SHA256:nqZRmQBESv4mL8sPJeloR8BeJuu47IonT86+pr8O2oA (ECDSA) SSH host key: SHA256:9R4/VKQtfRJYYKurXfPt+dYJ1nWqJvdYOdh+XJ7SiJ0 (ED25519) eth0: 172.31.21.44 fe80::4dd:91ff:fe07:6519 ip-172-31-21-44 login: [ 128.162546] kauditd_printk_skb: 368 callbacks suppressed [ 128.162551] audit: type=1400 audit(1696272686.793:1302): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.171902] audit: type=1400 audit(1696272686.801:1303): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.181187] audit: type=1400 audit(1696272686.801:1304): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.189420] audit: type=1400 audit(1696272686.801:1305): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.199879] audit: type=1400 audit(1696272686.801:1306): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.209419] audit: type=1400 audit(1696272686.801:1307): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.219512] audit: type=1400 audit(1696272686.801:1308): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.227756] audit: type=1400 audit(1696272686.801:1309): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.235543] audit: type=1400 audit(1696272686.801:1310): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.243767] audit: type=1400 audit(1696272686.803:1311): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 This is ip-172-31-21-44 (Linux aarch64 5.15.132-flatcar) 18:51:26 SSH host key: SHA256:RjX8etNhMOgBKm32qYzlSWt+xdFbmV12zzJ5z4PSZBg (RSA) SSH host key: SHA256:nqZRmQBESv4mL8sPJeloR8BeJuu47IonT86+pr8O2oA (ECDSA) SSH host key: SHA256:9R4/VKQtfRJYYKurXfPt+dYJ1nWqJvdYOdh+XJ7SiJ0 (ED25519) eth0: 172.31.21.44 fe80::4dd:91ff:fe07:6519 ip-172-31-21-44 login: [ 141.711653] kauditd_printk_skb: 82 callbacks suppressed [ 141.711658] audit: type=1130 audit(1696272700.339:1337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.44:22-139.178.89.65:50040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 141.893533] audit: type=1101 audit(1696272700.521:1338): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.907498] audit: type=1103 audit(1696272700.535:1339): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.920224] audit: type=1006 audit(1696272700.535:1340): pid=4981 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 [ 141.928276] audit: type=1300 audit(1696272700.535:1340): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc618e00 a2=3 a3=1 items=0 ppid=1 pid=4981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 141.939045] audit: type=1327 audit(1696272700.535:1340): proctitle=737368643A20636F7265205B707269765D [ 141.959301] audit: type=1105 audit(1696272700.587:1341): pid=4981 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.972416] audit: type=1103 audit(1696272700.599:1342): pid=4983 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 142.246632] audit: type=1106 audit(1696272700.874:1343): pid=4981 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 142.258572] audit: type=1104 audit(1696272700.878:1344): pid=4981 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.279254] kauditd_printk_skb: 13 callbacks suppressed [ 152.281253] audit: type=1130 audit(1696272710.906:1350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.44:22-139.178.89.65:54840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 152.464305] audit: type=1101 audit(1696272711.091:1351): pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.474936] audit: type=1103 audit(1696272711.094:1352): pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.485083] audit: type=1006 audit(1696272711.094:1353): pid=5062 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 [ 152.492058] audit: type=1300 audit(1696272711.094:1353): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd7df390 a2=3 a3=1 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 152.503377] audit: type=1327 audit(1696272711.094:1353): proctitle=737368643A20636F7265205B707269765D [ 152.528855] audit: type=1105 audit(1696272711.156:1354): pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.543119] audit: type=1103 audit(1696272711.170:1355): pid=5067 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.854677] audit: type=1106 audit(1696272711.480:1356): pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.867019] audit: type=1104 audit(1696272711.480:1357): pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.252810] kauditd_printk_skb: 23 callbacks suppressed [ 164.252815] audit: type=1130 audit(1696272722.879:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.44:22-139.178.89.65:38772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 164.437629] audit: type=1101 audit(1696272723.063:1378): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.452672] audit: type=1103 audit(1696272723.078:1379): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.463780] audit: type=1006 audit(1696272723.078:1380): pid=5166 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 [ 164.470442] audit: type=1300 audit(1696272723.078:1380): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4b34aa0 a2=3 a3=1 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 164.482902] audit: type=1327 audit(1696272723.078:1380): proctitle=737368643A20636F7265205B707269765D [ 164.497094] audit: type=1105 audit(1696272723.123:1381): pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.510133] audit: type=1103 audit(1696272723.131:1382): pid=5168 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.779692] audit: type=1106 audit(1696272723.406:1383): pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.792917] audit: type=1104 audit(1696272723.408:1384): pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 170.596703] kauditd_printk_skb: 1 callbacks suppressed [ 170.596708] audit: type=1325 audit(1696272729.222:1386): table=filter:113 family=2 entries=9 op=nft_register_rule pid=5239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 170.606971] audit: type=1300 audit(1696272729.222:1386): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe3e37260 a2=0 a3=ffff88b2c6c0 items=0 ppid=3027 pid=5239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 170.621752] audit: type=1327 audit(1696272729.222:1386): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 170.629780] audit: type=1325 audit(1696272729.225:1387): table=nat:114 family=2 entries=20 op=nft_register_rule pid=5239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 170.636465] audit: type=1300 audit(1696272729.225:1387): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe3e37260 a2=0 a3=ffff88b2c6c0 items=0 ppid=3027 pid=5239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 170.649949] audit: type=1327 audit(1696272729.225:1387): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 170.667206] audit: type=1325 audit(1696272729.293:1388): table=filter:115 family=2 entries=10 op=nft_register_rule pid=5241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 170.673661] audit: type=1300 audit(1696272729.293:1388): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff33480d0 a2=0 a3=ffffa8cce6c0 items=0 ppid=3027 pid=5241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 170.686776] audit: type=1327 audit(1696272729.293:1388): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 170.694624] audit: type=1325 audit(1696272729.296:1389): table=nat:116 family=2 entries=20 op=nft_register_rule pid=5241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 171.702699] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 171.705230] IPv6: ADDRCONF(NETDEV_CHANGE): cali6ecef85c11b: link becomes ready This is ip-172-31-21-44 (Linux aarch64 5.15.132-flatcar) 18:52:12 SSH host key: SHA256:RjX8etNhMOgBKm32qYzlSWt+xdFbmV12zzJ5z4PSZBg (RSA) SSH host key: SHA256:nqZRmQBESv4mL8sPJeloR8BeJuu47IonT86+pr8O2oA (ECDSA) SSH host key: SHA256:9R4/VKQtfRJYYKurXfPt+dYJ1nWqJvdYOdh+XJ7SiJ0 (ED25519) eth0: 172.31.21.44 fe80::4dd:91ff:fe07:6519