] Created slice system-modprobe.slice. [ 18.737338] systemd[1]: Created slice system-serial\x2dgetty.slice. [ OK ] Created slice system-serial\x2dgetty.slice. [ 18.743050] systemd[1]: Created slice system-system\x2dcloudinit.slice. [ OK ] Created slice system-system\x2dcloudinit.slice. [ 18.748779] systemd[1]: Created slice system-systemd\x2dfsck.slice. [ OK ] Created slice system-systemd\x2dfsck.slice. [ 18.754629] systemd[1]: Created slice user.slice. [ OK ] Created slice user.slice. [ 18.758570] systemd[1]: Started systemd-ask-password-console.path. [ OK ] Started systemd-ask-password-console.path. [ 18.763420] systemd[1]: Started systemd-ask-password-wall.path. [ OK ] Started systemd-ask-password-wall.path. [ 18.768529] systemd[1]: Set up automount boot.automount. [ OK ] Set up automount boot.automount. [ 18.772940] systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. [ OK ] Set up automount proc-sys-fs-binfmt_misc.automount. [ 18.778697] systemd[1]: Reached target integritysetup.target. [ OK ] Reached target integritysetup.target. [ 18.783105] systemd[1]: Reached target remote-cryptsetup.target. [ OK ] Reached target remote-cryptsetup.target. [ 18.787840] systemd[1]: Reached target remote-fs.target. [ OK ] Reached target remote-fs.target. [ 18.791863] systemd[1]: Reached target slices.target. [ OK ] Reached target slices.target. [ 18.795696] systemd[1]: Reached target swap.target. [ OK ] Reached target swap.target. [ 18.799583] systemd[1]: Reached target torcx.target. [ OK ] Reached target torcx.target. [ 18.803397] systemd[1]: Reached target veritysetup.target. [ OK ] Reached target veritysetup.target. [ 18.810157] systemd[1]: Listening on systemd-coredump.socket. [ OK ] Listening on systemd-coredump.socket. [ 18.814874] systemd[1]: Listening on systemd-initctl.socket. [ OK ] Listening on systemd-initctl.socket. [ 18.819712] kauditd_printk_skb: 40 callbacks suppressed [ 18.819716] audit: type=1400 audit(1696273363.106:83): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 18.827371] systemd[1]: Listening on systemd-journald-audit.socket. [ 18.829222] audit: type=1335 audit(1696273363.114:84): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 [ OK ] Listening on systemd-journald-audit.socket. [ 18.841536] systemd[1]: Listening on systemd-journald-dev-log.socket. [ OK ] Listening on systemd-journald-dev-log.socket. [ 18.851912] systemd[1]: Listening on systemd-journald.socket. [ OK ] Listening on systemd-journald.socket. [ 18.856600] systemd[1]: Listening on systemd-networkd.socket. [ OK ] Listening on systemd-networkd.socket. [ 18.861405] systemd[1]: Listening on systemd-udevd-control.socket. [ OK ] Listening on systemd-udevd-control.socket. [ 18.866276] systemd[1]: Listening on systemd-udevd-kernel.socket. [ OK ] Listening on systemd-udevd-kernel.socket. [ 18.871162] systemd[1]: Listening on systemd-userdbd.socket. [ OK ] Listening on systemd-userdbd.socket. [ 18.877887] systemd[1]: Mounting dev-hugepages.mount... Mounting dev-hugepages.mount... [ 18.895201] systemd[1]: Mounting dev-mqueue.mount... Mounting dev-mqueue.mount... [ 18.903259] systemd[1]: Mounting media.mount... Mounting media.mount... [ 18.910664] systemd[1]: Mounting sys-kernel-debug.mount... Mounting sys-kernel-debug.mount... [ 18.918906] systemd[1]: Mounting sys-kernel-tracing.mount... Mounting sys-kernel-tracing.mount... [ 18.927482] systemd[1]: Mounting tmp.mount... Mounting tmp.mount... [ 18.944112] systemd[1]: Starting flatcar-tmpfiles.service... Starting flatcar-tmpfiles.service... [ 18.971132] systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. [ 18.986883] systemd[1]: Starting kmod-static-nodes.service... Starting kmod-static-nodes.service... [ 19.005419] systemd[1]: Starting modprobe@configfs.service... Starting modprobe@configfs.service... [ 19.014127] systemd[1]: Starting modprobe@dm_mod.service... Starting modprobe@dm_mod.service... [ 19.028977] systemd[1]: Starting modprobe@drm.service... Starting modprobe@drm.service... [ 19.042430] systemd[1]: Starting modprobe@efi_pstore.service... Starting modprobe@efi_pstore.service... [ 19.052120] systemd[1]: Starting modprobe@fuse.service... Starting modprobe@fuse.service... [ 19.062055] systemd[1]: Starting modprobe@loop.service... Starting modprobe@loop.service... [ 19.072542] systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). [ 19.080728] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. [ 19.101377] systemd[1]: (This warning is only shown for the first unit using IP firewalling.) [ 19.110668] systemd[1]: Starting systemd-journald.service... Starting systemd-journald.service... [ 19.122596] systemd[1]: Starting systemd-modules-load.service... Starting systemd-modules-load.service... [ 19.134252] systemd[1]: Starting systemd-network-generator.service... Starting systemd-network-generator.service... [ 19.143580] systemd[1]: Starting systemd-remount-fs.service... Starting systemd-remount-fs.service... [ 19.153117] systemd[1]: Starting systemd-udev-trigger.service... Starting systemd-udev-trigger.service... [ 19.167927] systemd[1]: Mounted dev-hugepages.mount. [ OK ] Mounted dev-hugepages.mount. [ 19.176557] systemd[1]: Mounted dev-mqueue.mount. [ OK ] Mounted dev-mqueue.mount. [ 19.182546] systemd[1]: Mounted media.mount. [ OK ] Mounted media.mount. [ 19.188857] systemd[1]: Mounted sys-kernel-debug.mount. [ OK ] Mounted sys-kernel-debug.mount. [ 19.194958] systemd[1]: Mounted sys-kernel-tracing.mount. [ OK ] Mounted sys-kernel-tracing.mount. [ 19.202435] systemd[1]: Mounted tmp.mount. [ OK ] Mounted tmp.mount. [ 19.212670] systemd[1]: Finished kmod-static-nodes.service. [ OK ] Finished kmod-static-nodes.service. [ 19.219535] audit: type=1130 audit(1696273363.506:85): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 19.220073] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 19.238740] systemd[1]: Finished modprobe@configfs.service. [ OK ] Finished modprobe@configfs.service. [ 19.244720] loop: module loaded [ 19.250231] audit: type=1130 audit(1696273363.536:86): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 19.250935] systemd[1]: modprobe@dm_mod.service: Deactivated successfully. [ 19.261234] systemd[1]: Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@d[ 19.265313] audit: type=1131 audit(1696273363.536:87): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' m_mod.service. [ 19.276100] systemd[1]: modprobe@drm.service: Deactivated successfully. [ 19.278964] systemd[1]: Finished modprobe@drm.service. [ OK [[ 19.281315] audit: type=1130 audit(1696273363.562:88): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' 0m] Finished modprobe@drm.service. [ 19.297093] fuse: init (API version 7.34) [ 19.298235] systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. [ 19.298652] audit: type=1131 audit(1696273363.562:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 19.308739] systemd[1]: Finished modprobe@efi_pstore.service. [ OK ] Finished modprobe@efi_pstore.service. [ 19.317902] systemd[1]: Finished systemd-modules-load.service. [ 19.320314] audit: type=1130 audit(1696273363.584:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Finished systemd-modules-load.service. [ 19.333330] systemd[1]: modprobe@fuse.service: Deactivated successfully. [ 19.336259] systemd[1]: Finished modprobe@fuse.service. [ OK ] Finished modprobe@fuse.service.[ 19.344347] audit: type=1131 audit(1696273363.584:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 19.353635] systemd[1]: modprobe@loop.service: Deactivated successfully. [ 19.356587] systemd[1]: Finished modprobe@loop.service. [ OK ] Finished modprobe@loop.service. [ 19.363275] systemd[1]: Finished systemd-network-generator.service. [ 19.365665] audit: type=1130 audit(1696273363.602:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Finished systemd-network-generator.service. [ 19.391014] systemd[1]: Started systemd-journald.service. [ OK ] Started systemd-journald.service. [ OK ] Finished systemd-remount-fs.service. [ OK ] Reached target network-pre.target. Mounting sys-fs-fuse-connections.mount... Mounting sys-kernel-config.mount... Starting systemd-hwdb-update.service... Starting systemd-journal-flush.service... Starting systemd-random-seed.service... Starting systemd-sysctl.service... [ OK ] Mounted sys-fs-fuse-connections.mount. [ OK ] Mounted sys-kernel-config.mount. [ 19.533595] systemd-journald[1532]: Received client request to flush runtime journal. [ OK ] Finished systemd-random-seed.service. [ OK ] Reached target first-boot-complete.target. [ OK ] Finished systemd-sysctl.service. [ OK ] Finished systemd-udev-trigger.service. Starting systemd-udev-settle.service... [ OK ] Finished systemd-journal-flush.service. [ OK ] Finished flatcar-tmpfiles.service. Starting systemd-sysusers.service... [ OK ] Finished systemd-sysusers.service. Starting systemd-tmpfiles-setup-dev.service... [ OK ] Finished systemd-tmpfiles-setup-dev.service. [ OK ] Finished systemd-hwdb-update.service. Starting systemd-udevd.service... [ OK ] Started systemd-udevd.service. Starting systemd-networkd.service... Starting systemd-userdbd.service... [ OK ] Found device dev-ttyS0.device. [ OK ] Started systemd-userdbd.service. [ OK ] Started systemd-networkd.service. Starting systemd-networkd-wait-online.service... [ 20.980268] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 21.040775] BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1593) [ OK ] Finished systemd-udev-settle.service. Starting lvm2-activation-early.service... [ OK ] Finished lvm2-activation-early.service. [ OK ] Reached target cryptsetup.target. Starting lvm2-activation.service... [ OK ] Finished lvm2-activation.service. [ OK ] Reached target local-fs-pre.target. [ OK ] Reached target local-fs.target. [ OK ] Reached target machines.target. Starting ldconfig.service... Starting systemd-boot-update.service... Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Starting systemd-machine-id-commit.service... Starting systemd-tmpfiles-setup.service... Starting systemd-fsck@dev-…label-EFI\x2dSYSTEM.service... [ OK ] Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. [ OK ] Finished systemd-fsck@dev-…2dlabel-EFI\x2dSYSTEM.service. Mounting boot.mount... [ OK ] Mounted boot.mount. [ OK ] Finished systemd-boot-update.service. [ OK ] Finished systemd-tmpfiles-setup.service. Starting audit-rules.service... Starting clean-ca-certificates.service... Starting systemd-journal-catalog-update.service... Starting systemd-resolved.service... Starting systemd-timesyncd.service... Starting systemd-update-utmp.service... [ OK ] Finished clean-ca-certificates.service. [ OK ] Finished systemd-journal-catalog-update.service. [ OK ] Finished systemd-update-utmp.service. [ OK ] Started systemd-timesyncd.service. [ OK ] Finished audit-rules.service. [ OK ] Reached target time-set.target. [ OK ] Started systemd-resolved.service. [ OK ] Reached target network.target. [ OK ] Reached target nss-lookup.target. [ OK ] Finished ldconfig.service. Starting systemd-update-done.service... [ OK ] Finished systemd-update-done.service. [ OK ] Reached target sysinit.target. [ OK ] Started motdgen.path. [ OK ] Started user-cloudinit@var…car\x2dinstall-user_data.path. [ OK ] Started logrotate.timer. [ OK ] Started mdadm.timer. [ OK ] Started systemd-tmpfiles-clean.timer. [ OK ] Reached target paths.target. [ OK ] Reached target timers.target. [ OK ] Listening on dbus.socket. Starting docker.socket... [ OK ] Listening on sshd.socket. [ OK ] Listening on docker.socket. [ OK ] Reached target sockets.target. [ OK ] Reached target basic.target. Starting containerd.service... Starting coreos-metadata-sshkeys@core.service... Starting dbus.service... Starting enable-oem-cloudinit.service... Starting extend-filesystems.service... Starting motdgen.service... Starting prepare-cni-plugins.service... Starting prepare-critools.service... Starting ssh-key-proc-cmdline.service... Starting sshd-keygen.service... Starting systemd-logind.service... Starting update-engine.service... Starting update-ssh-keys-after-ignition.service... [ OK ] Finished systemd-machine-id-commit.service. [ OK ] Finished systemd-networkd-wait-online.service. [ OK ] Reached target network-online.target. [ OK ] Started amazon-ssm-agent.service. [ OK ] Started nvidia.service. [ OK ] Finished ssh-key-proc-cmdline.service. [ OK ] Started dbus.service. [ OK ] Reached target system-config.target. [ OK ] Reached target user-config.target. Starting systemd-hostnamed.service... [ 23.084752] extend-filesystems[1781]: Found nvme0n1 [ 23.088214] extend-filesystems[1781]: Found nvme0n1p1 [ 23.091349] extend-filesystems[1781]: Found nvme0n1p2 [ 23.094480] extend-filesystems[1781]: Found nvme0n1p3 [ 23.097538] extend-filesystems[1781]: Found usr [ 23.100324] extend-filesystems[1781]: Found nvme0n1p4 [ 23.103362] extend-filesystems[1781]: Found nvme0n1p6 [ 23.106456] extend-filesystems[1781]: Found nvme0n1p7 [ 23.109509] extend-filesystems[1781]: Found nvme0n1p9 [ 23.112553] extend-filesystems[1781]: Checking size of /dev/nvme0n1p9 [ 23.255323] extend-filesystems[1781]: Resized partition /dev/nvme0n1p9 [ OK ] Started update-engine.service. [ OK ] Started locksmithd.service. [ 23.310133] extend-filesystems[1856]: resize2fs 1.46.5 (30-Dec-2021) [ 23.506699] EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks [ OK ] Finished motdgen.service. [ 23.594464] EXT4-fs (nvme0n1p9): resized filesystem to 1489915 [ 23.445126] extend-filesystems[1856]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required [ 23.455096] extend-filesystems[1856]: old_desc_blocks = 1, new_desc_blocks = 1 [ OK ] Finished extend-filesystems.service. [ 23.460088] extend-filesystems[1856]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. [ 23.479897] extend-filesystems[1781]: Resized filesystem in /dev/nvme0n1p9 [ OK ] Finished update-ssh-keys-after-ignition.service. [ OK ] Started systemd-logind.service. [ OK ] Started containerd.service. [ OK ] Started systemd-hostnamed.service. Starting polkit.service... [ OK ] Started polkit.service. [ OK ] Finished coreos-metadata-sshkeys@core.service. [ OK ] Finished prepare-critools.service. [ OK ] Finished prepare-cni-plugins.service. [ OK ] Finished sshd-keygen.service. Starting issuegen.service... [ OK ] Finished issuegen.service. Starting systemd-user-sessions.service... [ OK ] Finished systemd-user-sessions.service. [ OK ] Started getty@tty1.service. [ OK ] Started serial-getty@ttyS0.service. [ OK ] Reached target getty.target. [ OK ] Reached target multi-user.target. Starting systemd-update-utmp-runlevel.service... [ OK ] Finished systemd-update-utmp-runlevel.service. This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:02:51 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: [ 34.850314] kauditd_printk_skb: 37 callbacks suppressed [ 34.850319] audit: type=1305 audit(1696273378.820:126): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 34.857496] audit: type=1300 audit(1696273378.820:126): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc784f420 a2=420 a3=0 items=0 ppid=1 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 34.868802] audit: type=1327 audit(1696273378.820:126): proctitle=2F7362696E2F617564697463746C002D44 [ 34.872853] audit: type=1131 audit(1696273378.828:127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 34.944790] audit: type=1130 audit(1696273378.912:128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 34.956852] audit: type=1106 audit(1696273378.923:129): pid=2064 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 34.966274] audit: type=1104 audit(1696273378.924:130): pid=2064 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 34.982413] audit: type=1106 audit(1696273378.948:131): pid=2060 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 34.995480] audit: type=1104 audit(1696273378.949:132): pid=2060 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 35.004947] audit: type=1131 audit(1696273378.965:133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.29.80:22-139.178.89.65:50034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 40.282576] kauditd_printk_skb: 17 callbacks suppressed [ 40.282581] audit: type=1400 audit(1696273384.209:149): avc: denied { mac_admin } for pid=2318 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 40.292517] audit: type=1401 audit(1696273384.209:149): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 40.296915] audit: type=1300 audit(1696273384.209:149): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000be4a50 a1=400077eb58 a2=4000be4a20 a3=25 items=0 ppid=1 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 40.308962] audit: type=1327 audit(1696273384.209:149): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 40.323142] audit: type=1400 audit(1696273384.210:150): avc: denied { mac_admin } for pid=2318 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 40.334867] audit: type=1401 audit(1696273384.210:150): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 40.338948] audit: type=1300 audit(1696273384.210:150): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d75320 a1=400077eb70 a2=4000be4ae0 a3=25 items=0 ppid=1 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 40.354158] audit: type=1327 audit(1696273384.210:150): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 40.388128] audit: type=1325 audit(1696273384.315:151): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 40.394758] audit: type=1300 audit(1696273384.315:151): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeeba3180 a2=0 a3=1 items=0 ppid=2318 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 53.240501] kauditd_printk_skb: 101 callbacks suppressed [ 53.240506] audit: type=1106 audit(1696273397.135:185): pid=2097 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 53.251879] audit: type=1104 audit(1696273397.135:186): pid=2097 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 53.268217] audit: type=1106 audit(1696273397.162:187): pid=2093 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 53.281191] audit: type=1104 audit(1696273397.162:188): pid=2093 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 53.291769] audit: type=1131 audit(1696273397.179:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.80:22-139.178.89.65:50046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 54.605600] audit: type=1131 audit(1696273398.499:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 74.118591] audit: type=1131 audit(1696273418.015:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 74.176377] audit: type=1130 audit(1696273418.074:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 74.698139] IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP) [ 74.700416] IPVS: Connection hash table configured (size=4096, memory=32Kbytes) [ 74.703528] IPVS: ipvs loaded. [ 74.719277] IPVS: [rr] scheduler registered. [ 74.731959] IPVS: [wrr] scheduler registered. [ 74.745663] IPVS: [sh] scheduler registered. [ 74.861008] audit: type=1325 audit(1696273418.759:193): table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 74.866997] audit: type=1300 audit(1696273418.759:193): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5316610 a2=0 a3=ffff9b2156c0 items=0 ppid=2734 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 74.886904] audit: type=1327 audit(1696273418.759:193): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 [ 74.896492] audit: type=1325 audit(1696273418.773:194): table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" [ 74.903273] audit: type=1300 audit(1696273418.773:194): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc135d400 a2=0 a3=ffff9bb656c0 items=0 ppid=2734 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 74.915947] audit: type=1327 audit(1696273418.773:194): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 [ 74.927844] audit: type=1325 audit(1696273418.780:195): table=nat:37 family=10 entries=1 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" [ 74.933843] audit: type=1300 audit(1696273418.780:195): arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3617b00 a2=0 a3=ffffa84616c0 items=0 ppid=2734 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 77.414343] WARNING: Unprivileged eBPF is enabled, data leaks possible via Spectre v2 BHB attacks! [ 78.144583] Initializing XFRM netlink socket [ 78.153853] WARNING: Unprivileged eBPF is enabled, data leaks possible via Spectre v2 BHB attacks! [ 79.645616] IPv6: ADDRCONF(NETDEV_CHANGE): cilium_net: link becomes ready [ 79.648238] IPv6: ADDRCONF(NETDEV_CHANGE): cilium_host: link becomes ready [ 80.504429] NET: Registered PF_ALG protocol family [ 80.515126] kauditd_printk_skb: 3952 callbacks suppressed [ 80.515131] audit: type=1334 audit(1696273424.414:2055): prog-id=823 op=LOAD [ 80.519751] audit: type=1300 audit(1696273424.414:2055): arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffe543b2d8 a2=74 a3=d items=0 ppid=3104 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tc" exe="/usr/local/bin/tc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 80.531954] audit: type=1327 audit(1696273424.414:2055): proctitle=74630066696C746572007265706C616365006465760063696C69756D5F76786C616E00696E6772657373007072696F00310068616E646C65003100627066006461006F626A006270665F6F7665726C61792E6F007365630066726F6D2D6F7665726C6179 [ 80.540592] audit: type=1334 audit(1696273424.414:2056): prog-id=823 op=UNLOAD [ 80.543262] audit: type=1334 audit(1696273424.414:2057): prog-id=824 op=LOAD [ 80.546119] audit: type=1300 audit(1696273424.414:2057): arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffe543b2b8 a2=80 a3=0 items=0 ppid=3104 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tc" exe="/usr/local/bin/tc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 80.557506] audit: type=1327 audit(1696273424.414:2057): proctitle=74630066696C746572007265706C616365006465760063696C69756D5F76786C616E00696E6772657373007072696F00310068616E646C65003100627066006461006F626A006270665F6F7665726C61792E6F007365630066726F6D2D6F7665726C6179 [ 80.565995] audit: type=1334 audit(1696273424.416:2058): prog-id=824 op=UNLOAD [ 80.568818] audit: type=1334 audit(1696273424.416:2059): prog-id=825 op=LOAD [ 80.571666] audit: type=1300 audit(1696273424.416:2059): arch=c00000b7 syscall=280 success=yes exit=8 a0=5 a1=ffffe543af78 a2=80 a3=ffffa92961b4 items=0 ppid=3104 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tc" exe="/usr/local/bin/tc" subj=system_u:system_r:kernel_t:s0 key=(null) This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:03:44 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:03:45 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: [ 82.299050] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:03:46 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:03:48 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: [ 85.515330] kauditd_printk_skb: 915 callbacks suppressed [ 85.515335] audit: type=1334 audit(1696273429.415:2454): prog-id=997 op=LOAD [ 85.519940] audit: type=1300 audit(1696273429.415:2454): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffdf2b088 a2=90 a3=2 items=0 ppid=3487 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 85.531945] audit: type=1327 audit(1696273429.415:2454): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 85.535946] audit: type=1334 audit(1696273429.415:2455): prog-id=997 op=UNLOAD [ 85.538772] audit: type=1334 audit(1696273429.415:2456): prog-id=998 op=LOAD [ 85.541704] audit: type=1300 audit(1696273429.415:2456): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffdf2b088 a2=90 a3=2 items=0 ppid=3487 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 85.552924] audit: type=1327 audit(1696273429.415:2456): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 85.556908] audit: type=1334 audit(1696273429.417:2457): prog-id=998 op=UNLOAD [ 85.559759] audit: type=1334 audit(1696273429.417:2458): prog-id=999 op=LOAD [ 85.562491] audit: audit_backlog=65 > audit_backlog_limit=64 This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:03:49 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: [ 90.369362] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 90.616476] kauditd_printk_skb: 3553 callbacks suppressed [ 90.616481] audit: type=1400 audit(1696273434.517:4098): avc: denied { open } for pid=3487 comm="cilium-agent" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=0 [ 90.639768] audit: type=1300 audit(1696273434.517:4098): arch=c00000b7 syscall=241 success=no exit=-13 a0=4000a6b728 a1=ffffffffffffffff a2=0 a3=ffffffffffffffff items=0 ppid=2422 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cilium-agent" exe="/usr/bin/cilium-agent" subj=system_u:system_r:kernel_t:s0 key=(null) [ 90.661855] audit: type=1327 audit(1696273434.517:4098): proctitle=63696C69756D2D6167656E74002D2D636F6E6669672D6469723D2F746D702F63696C69756D2F636F6E6669672D6D6170 [ 90.916523] eth0: renamed from tmp844fb [ 90.924849] IPv6: ADDRCONF(NETDEV_CHANGE): lxce93859db68c1: link becomes ready This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:03:56 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:03:57 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: [ 107.369359] audit: type=1334 audit(1696273451.270:4099): prog-id=1688 op=LOAD [ 107.372107] audit: type=1300 audit(1696273451.270:4099): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb986768 a2=74 a3=0 items=0 ppid=4034 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 107.383872] audit: type=1327 audit(1696273451.270:4099): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 107.387893] audit: type=1334 audit(1696273451.274:4100): prog-id=1688 op=UNLOAD [ 107.390990] audit: type=1334 audit(1696273451.274:4101): prog-id=1689 op=LOAD [ 107.394034] audit: type=1300 audit(1696273451.274:4101): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb9857a8 a2=90 a3=2 items=0 ppid=4034 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 107.405217] audit: type=1327 audit(1696273451.274:4101): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 107.409116] audit: type=1334 audit(1696273451.284:4102): prog-id=1689 op=UNLOAD [ 107.411803] audit: type=1334 audit(1696273451.284:4103): prog-id=1690 op=LOAD [ 107.414500] audit: type=1300 audit(1696273451.284:4103): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb9857a8 a2=90 a3=2 items=0 ppid=4034 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 112.384849] kauditd_printk_skb: 4158 callbacks suppressed [ 112.384854] audit: type=1325 audit(1696273456.286:6021): table=nat:309 family=2 entries=1 op=nft_unregister_chain pid=4445 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 112.393132] audit: type=1300 audit(1696273456.286:6021): arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd484c990 a2=0 a3=ffffb3de55c0 items=0 ppid=4034 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 112.405241] audit: type=1327 audit(1696273456.286:6021): proctitle=69707461626C6573002D770035002D74006E6174002D58004F4C445F43494C49554D5F4F55545055545F6E6174 [ 112.410561] audit: type=1325 audit(1696273456.304:6022): table=nat:310 family=2 entries=1 op=nft_unregister_chain pid=4448 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 112.416448] audit: type=1300 audit(1696273456.304:6022): arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffeb0e30d0 a2=0 a3=ffff81ebd5c0 items=0 ppid=4034 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 112.428268] audit: type=1327 audit(1696273456.304:6022): proctitle=69707461626C6573002D770035002D74006E6174002D58004F4C445F43494C49554D5F5052455F6E6174 [ 112.433304] audit: type=1325 audit(1696273456.318:6023): table=mangle:311 family=2 entries=1 op=nft_unregister_chain pid=4451 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 112.439129] audit: type=1300 audit(1696273456.318:6023): arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff5c13840 a2=0 a3=ffffb2d335c0 items=0 ppid=4034 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 112.450883] audit: type=1327 audit(1696273456.318:6023): proctitle=69707461626C6573002D770035002D74006D616E676C65002D58004F4C445F43494C49554D5F504F53545F6D616E676C65 [ 112.456399] audit: type=1325 audit(1696273456.335:6024): table=mangle:312 family=2 entries=1 op=nft_unregister_chain pid=4454 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 112.637726] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:04:19 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:04:20 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: [ 137.412601] kauditd_printk_skb: 14 callbacks suppressed [ 137.412606] audit: type=1334 audit(1696273481.314:6029): prog-id=2515 op=LOAD [ 137.418089] audit: type=1300 audit(1696273481.314:6029): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef85bdd8 a2=74 a3=0 items=0 ppid=4559 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 137.430178] audit: type=1327 audit(1696273481.314:6029): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 137.434664] audit: type=1334 audit(1696273481.314:6030): prog-id=2515 op=UNLOAD [ 137.437787] audit: type=1334 audit(1696273481.314:6031): prog-id=2516 op=LOAD [ 137.440605] audit: type=1300 audit(1696273481.314:6031): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef85ae18 a2=90 a3=2 items=0 ppid=4559 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 137.452123] audit: type=1327 audit(1696273481.314:6031): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 137.456036] audit: type=1334 audit(1696273481.316:6032): prog-id=2516 op=UNLOAD [ 137.458860] audit: type=1334 audit(1696273481.316:6033): prog-id=2517 op=LOAD [ 137.461598] audit: type=1300 audit(1696273481.316:6033): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef85ae18 a2=90 a3=2 items=0 ppid=4559 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 142.417173] kauditd_printk_skb: 4127 callbacks suppressed [ 142.417178] audit: type=1325 audit(1696273486.318:7946): table=filter:394 family=2 entries=1 op=nft_unregister_rule pid=4944 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 142.425048] audit: type=1300 audit(1696273486.318:7946): arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffea1f8e30 a2=0 a3=ffffbd1e95c0 items=0 ppid=4559 pid=4944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 142.436910] audit: type=1327 audit(1696273486.318:7946): proctitle=69707461626C6573002D770035002D740066696C746572002D44004F4C445F43494C49554D5F464F5257415244002D690063696C69756D5F686F7374002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D3A20636C75737465722D3E616E79206F6E2063696C69756D5F686F737420666F7277617264206163 [ 142.447393] audit: type=1325 audit(1696273486.327:7947): table=filter:395 family=2 entries=1 op=nft_unregister_rule pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 142.453144] audit: type=1300 audit(1696273486.327:7947): arch=c00000b7 syscall=211 success=yes exit=592 a0=3 a1=fffff4bdbcd0 a2=0 a3=ffffacacd5c0 items=0 ppid=4559 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 142.464735] audit: type=1327 audit(1696273486.327:7947): proctitle=69707461626C6573002D770035002D740066696C746572002D44004F4C445F43494C49554D5F464F5257415244002D69006C78632B002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D3A20636C75737465722D3E616E79206F6E206C78632B20666F727761726420616363657074002D6A00414343455054 [ 142.475016] audit: type=1325 audit(1696273486.360:7948): table=filter:396 family=2 entries=1 op=nft_unregister_rule pid=4946 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 142.480728] audit: type=1300 audit(1696273486.360:7948): arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe37a37f0 a2=0 a3=ffffb29ac5c0 items=0 ppid=4559 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 142.492374] audit: type=1327 audit(1696273486.360:7948): proctitle=69707461626C6573002D770035002D740066696C746572002D44004F4C445F43494C49554D5F464F5257415244002D690063696C69756D5F6E6574002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D3A20636C75737465722D3E616E79206F6E2063696C69756D5F6E657420666F72776172642061636365 [ 142.502649] audit: type=1325 audit(1696273486.364:7949): table=filter:397 family=2 entries=1 op=nft_unregister_rule pid=4947 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 142.818775] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 143.410141] eth0: renamed from tmpeb066 [ 143.418016] IPv6: ADDRCONF(NETDEV_CHANGE): lxcb9149c09a1d4: link becomes ready This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:04:49 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:04:50 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: [ 196.771811] kauditd_printk_skb: 41 callbacks suppressed [ 196.771816] audit: type=1334 audit(1696273540.674:7963): prog-id=3342 op=LOAD [ 196.776558] audit: type=1300 audit(1696273540.674:7963): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff90442b8 a2=74 a3=0 items=0 ppid=5504 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 196.787671] audit: type=1327 audit(1696273540.674:7963): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 196.791560] audit: type=1334 audit(1696273540.674:7964): prog-id=3342 op=UNLOAD [ 196.794277] audit: type=1334 audit(1696273540.674:7965): prog-id=3343 op=LOAD [ 196.796960] audit: type=1300 audit(1696273540.674:7965): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff90432f8 a2=90 a3=2 items=0 ppid=5504 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 196.809345] audit: type=1327 audit(1696273540.674:7965): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 196.814196] audit: type=1334 audit(1696273540.677:7966): prog-id=3343 op=UNLOAD [ 196.816938] audit: type=1334 audit(1696273540.677:7967): prog-id=3344 op=LOAD [ 196.819637] audit: type=1300 audit(1696273540.677:7967): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff90432f8 a2=90 a3=2 items=0 ppid=5504 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 197.602179] alg: No test for seqiv(rfc4106(gcm(aes))) (seqiv(rfc4106(gcm-aes-ce))) [ 197.851934] systemd-journald[1532]: Data hash table of /var/log/journal/ec2dc76a5d192adccf137f14c68250fb/system.journal has a fill level at 75.0 (33392 of 44522 items, 25165824 file size, 753 bytes per hash table item), suggesting rotation. [ 197.860548] systemd-journald[1532]: /var/log/journal/ec2dc76a5d192adccf137f14c68250fb/system.journal: Journal header limits reached or header out-of-date, rotating. [ 201.774189] kauditd_printk_skb: 4168 callbacks suppressed [ 201.774194] audit: type=1325 audit(1696273545.677:9903): table=raw:493 family=2 entries=1 op=nft_unregister_rule pid=5942 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 201.781981] audit: type=1300 audit(1696273545.677:9903): arch=c00000b7 syscall=211 success=yes exit=632 a0=3 a1=fffff54a2600 a2=0 a3=ffff8a2555c0 items=0 ppid=5504 pid=5942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 201.794215] audit: type=1327 audit(1696273545.677:9903): proctitle=69707461626C6573002D770035002D7400726177002D44004F4C445F43494C49554D5F5052455F726177002D6D006D61726B002D2D6D61726B0030783230302F3078663030002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D3A204E4F545241434B20666F722070726F78792074726166666963002D6A [ 201.804995] audit: type=1325 audit(1696273545.702:9904): table=filter:494 family=2 entries=1 op=nft_unregister_rule pid=5945 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 201.810772] audit: type=1300 audit(1696273545.702:9904): arch=c00000b7 syscall=211 success=yes exit=536 a0=3 a1=ffffffddf510 a2=0 a3=ffff8151b5c0 items=0 ppid=5504 pid=5945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 201.822703] audit: type=1327 audit(1696273545.702:9904): proctitle=69707461626C6573002D770035002D740066696C746572002D4400494E505554002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D2D6665656465723A2043494C49554D5F494E505554002D6A004F4C445F43494C49554D5F494E505554 [ 201.831508] audit: type=1325 audit(1696273545.706:9905): table=filter:495 family=2 entries=1 op=nft_unregister_rule pid=5946 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 201.837288] audit: type=1300 audit(1696273545.706:9905): arch=c00000b7 syscall=211 success=yes exit=536 a0=3 a1=ffffc0ae1880 a2=0 a3=ffff9f7385c0 items=0 ppid=5504 pid=5946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 201.849062] audit: type=1327 audit(1696273545.706:9905): proctitle=69707461626C6573002D770035002D740066696C746572002D4400464F5257415244002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D2D6665656465723A2043494C49554D5F464F5257415244002D6A004F4C445F43494C49554D5F464F5257415244 [ 201.862768] audit: type=1325 audit(1696273545.765:9906): table=filter:496 family=2 entries=1 op=nft_unregister_rule pid=5947 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 202.181057] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 202.985852] eth0: renamed from tmp779da [ 202.992531] IPv6: ADDRCONF(NETDEV_CHANGE): lxce1be41637a18: link becomes ready This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:05:48 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:05:49 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: [ 206.775353] kauditd_printk_skb: 3833 callbacks suppressed [ 206.775358] audit: type=1400 audit(1696273550.678:11678): avc: denied { confidentiality } for pid=6223 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 [ 206.787092] audit: type=1300 audit(1696273550.678:11678): arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe74625d8 a2=90 a3=2 items=0 ppid=6124 pid=6223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 206.798523] audit: type=1327 audit(1696273550.678:11678): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 206.804661] audit: type=1400 audit(1696273550.678:11679): avc: denied { confidentiality } for pid=6223 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 [ 206.814023] audit: type=1300 audit(1696273550.678:11679): arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe74625d8 a2=90 a3=2 items=0 ppid=6124 pid=6223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 206.825716] audit: type=1327 audit(1696273550.678:11679): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 206.829696] audit: type=1400 audit(1696273550.685:11680): avc: denied { confidentiality } for pid=6223 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 [ 206.838726] audit: type=1300 audit(1696273550.685:11680): arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe74625d8 a2=90 a3=2 items=0 ppid=6124 pid=6223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 206.850693] audit: type=1327 audit(1696273550.685:11680): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 206.854851] audit: type=1400 audit(1696273550.685:11681): avc: denied { confidentiality } for pid=6223 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 [ 211.243746] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 212.695086] eth0: renamed from tmpd4099 [ 212.705161] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 212.707621] IPv6: ADDRCONF(NETDEV_CHANGE): lxce61e2935a917: link becomes ready This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:05:57 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:05:58 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: [ 238.217071] kauditd_printk_skb: 547 callbacks suppressed [ 238.217077] audit: type=1334 audit(1696273582.121:11883): prog-id=4996 op=LOAD [ 238.221830] audit: type=1300 audit(1696273582.121:11883): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc572ee48 a2=74 a3=0 items=0 ppid=6780 pid=6837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 238.233085] audit: type=1327 audit(1696273582.121:11883): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 238.237019] audit: type=1334 audit(1696273582.121:11884): prog-id=4996 op=UNLOAD [ 238.239837] audit: type=1334 audit(1696273582.121:11885): prog-id=4997 op=LOAD [ 238.242561] audit: type=1300 audit(1696273582.121:11885): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc572de88 a2=90 a3=2 items=0 ppid=6780 pid=6837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 238.253866] audit: type=1327 audit(1696273582.121:11885): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 238.257807] audit: type=1334 audit(1696273582.123:11886): prog-id=4997 op=UNLOAD [ 238.260621] audit: type=1334 audit(1696273582.123:11887): prog-id=4998 op=LOAD [ 238.263364] audit: type=1300 audit(1696273582.123:11887): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc572de88 a2=90 a3=2 items=0 ppid=6780 pid=6837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 243.223245] kauditd_printk_skb: 4181 callbacks suppressed [ 243.223250] audit: type=1325 audit(1696273587.127:13828): table=raw:728 family=2 entries=1 op=nft_unregister_rule pid=7209 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 243.231106] audit: type=1300 audit(1696273587.127:13828): arch=c00000b7 syscall=211 success=yes exit=724 a0=3 a1=fffffe82a2d0 a2=0 a3=ffff912045c0 items=0 ppid=6780 pid=7209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 243.242940] audit: type=1327 audit(1696273587.127:13828): proctitle=69707461626C6573002D770035002D7400726177002D44004F4C445F43494C49554D5F4F55545055545F726177002D6F0063696C69756D5F686F7374002D6D006D61726B002D2D6D61726B0030783830302F3078653030002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D3A204E4F545241434B20666F72 [ 243.253278] audit: type=1325 audit(1696273587.136:13829): table=raw:729 family=2 entries=1 op=nft_unregister_rule pid=7210 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 243.258970] audit: type=1300 audit(1696273587.136:13829): arch=c00000b7 syscall=211 success=yes exit=632 a0=3 a1=ffffde54e280 a2=0 a3=ffffb26075c0 items=0 ppid=6780 pid=7210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 243.270837] audit: type=1327 audit(1696273587.136:13829): proctitle=69707461626C6573002D770035002D7400726177002D44004F4C445F43494C49554D5F5052455F726177002D6D006D61726B002D2D6D61726B0030786430302F3078663030002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D2D7866726D2D6E6F747261636B3A002D6A004354002D2D6E6F747261636B [ 243.281213] audit: type=1325 audit(1696273587.181:13830): table=raw:730 family=2 entries=1 op=nft_unregister_rule pid=7211 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 243.287185] audit: type=1300 audit(1696273587.181:13830): arch=c00000b7 syscall=211 success=yes exit=632 a0=3 a1=ffffe4ede040 a2=0 a3=ffff913875c0 items=0 ppid=6780 pid=7211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 243.299076] audit: type=1327 audit(1696273587.181:13830): proctitle=69707461626C6573002D770035002D7400726177002D44004F4C445F43494C49554D5F5052455F726177002D6D006D61726B002D2D6D61726B0030786530302F3078663030002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D2D7866726D2D6E6F747261636B3A002D6A004354002D2D6E6F747261636B [ 243.309736] audit: type=1325 audit(1696273587.190:13831): table=raw:731 family=2 entries=1 op=nft_unregister_rule pid=7212 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 243.772693] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 244.741952] eth0: renamed from tmpc8641 [ 244.749567] IPv6: ADDRCONF(NETDEV_CHANGE): lxc1087bcdaa9cc: link becomes ready This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:06:29 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:06:31 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039 ip-172-31-29-80 login: This is ip-172-31-29-80 (Linux aarch64 5.15.132-flatcar) 19:06:32 SSH host key: SHA256:BCy3W+iU4lkoQ4t97wdDF1r8FvHJdr5r1h67UDa5fdA (RSA) SSH host key: SHA256:kvmFrRfeUCNDuTIKjvPnS2/NlhNldoJjO1lNfvq1Gtk (ECDSA) SSH host key: SHA256:NE91MgP4TrfUadRlt5CYMHD8TPjvtk/LEja7Yh5VcPQ (ED25519) eth0: 172.31.29.80 fe80::468:35ff:fe62:1039