Feb  9 19:26:35.296619 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024
Feb  9 19:26:35.296654 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6
Feb  9 19:26:35.296671 kernel: BIOS-provided physical RAM map:
Feb  9 19:26:35.296693 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Feb  9 19:26:35.296713 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Feb  9 19:26:35.296725 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
Feb  9 19:26:35.296741 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable
Feb  9 19:26:35.296753 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved
Feb  9 19:26:35.296765 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved
Feb  9 19:26:35.296776 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved
Feb  9 19:26:35.296788 kernel: NX (Execute Disable) protection: active
Feb  9 19:26:35.296799 kernel: SMBIOS 2.7 present.
Feb  9 19:26:35.296810 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017
Feb  9 19:26:35.296822 kernel: Hypervisor detected: KVM
Feb  9 19:26:35.296839 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00
Feb  9 19:26:35.296852 kernel: kvm-clock: cpu 0, msr 6efaa001, primary cpu clock
Feb  9 19:26:35.296864 kernel: kvm-clock: using sched offset of 7824831057 cycles
Feb  9 19:26:35.296878 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Feb  9 19:26:35.296891 kernel: tsc: Detected 2499.996 MHz processor
Feb  9 19:26:35.296904 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Feb  9 19:26:35.296920 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Feb  9 19:26:35.296932 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000
Feb  9 19:26:35.296945 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Feb  9 19:26:35.296958 kernel: Using GB pages for direct mapping
Feb  9 19:26:35.296971 kernel: ACPI: Early table checksum verification disabled
Feb  9 19:26:35.296984 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON)
Feb  9 19:26:35.296997 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001)
Feb  9 19:26:35.297010 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001)
Feb  9 19:26:35.297023 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001)
Feb  9 19:26:35.297038 kernel: ACPI: FACS 0x000000007D9EFF40 000040
Feb  9 19:26:35.297050 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Feb  9 19:26:35.297063 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001)
Feb  9 19:26:35.297117 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001)
Feb  9 19:26:35.297131 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001)
Feb  9 19:26:35.297144 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001)
Feb  9 19:26:35.297157 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001)
Feb  9 19:26:35.297170 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Feb  9 19:26:35.297186 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3]
Feb  9 19:26:35.297198 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488]
Feb  9 19:26:35.297211 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f]
Feb  9 19:26:35.297229 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39]
Feb  9 19:26:35.297243 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645]
Feb  9 19:26:35.297256 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf]
Feb  9 19:26:35.297270 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b]
Feb  9 19:26:35.297455 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7]
Feb  9 19:26:35.297472 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037]
Feb  9 19:26:35.297486 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba]
Feb  9 19:26:35.297499 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Feb  9 19:26:35.297513 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0
Feb  9 19:26:35.297569 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff]
Feb  9 19:26:35.297586 kernel: NUMA: Initialized distance table, cnt=1
Feb  9 19:26:35.297632 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff]
Feb  9 19:26:35.297653 kernel: Zone ranges:
Feb  9 19:26:35.297667 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Feb  9 19:26:35.298712 kernel:   DMA32    [mem 0x0000000001000000-0x000000007d9e9fff]
Feb  9 19:26:35.298738 kernel:   Normal   empty
Feb  9 19:26:35.298753 kernel: Movable zone start for each node
Feb  9 19:26:35.298767 kernel: Early memory node ranges
Feb  9 19:26:35.298781 kernel:   node   0: [mem 0x0000000000001000-0x000000000009efff]
Feb  9 19:26:35.298795 kernel:   node   0: [mem 0x0000000000100000-0x000000007d9e9fff]
Feb  9 19:26:35.298810 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff]
Feb  9 19:26:35.298828 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Feb  9 19:26:35.298841 kernel: On node 0, zone DMA: 97 pages in unavailable ranges
Feb  9 19:26:35.298856 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges
Feb  9 19:26:35.298870 kernel: ACPI: PM-Timer IO Port: 0xb008
Feb  9 19:26:35.298884 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Feb  9 19:26:35.298898 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23
Feb  9 19:26:35.298912 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
Feb  9 19:26:35.298926 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Feb  9 19:26:35.298940 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
Feb  9 19:26:35.298956 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
Feb  9 19:26:35.298970 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Feb  9 19:26:35.298984 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Feb  9 19:26:35.298998 kernel: TSC deadline timer available
Feb  9 19:26:35.299012 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs
Feb  9 19:26:35.299124 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices
Feb  9 19:26:35.299140 kernel: Booting paravirtualized kernel on KVM
Feb  9 19:26:35.299156 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Feb  9 19:26:35.299170 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1
Feb  9 19:26:35.299188 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576
Feb  9 19:26:35.299202 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152
Feb  9 19:26:35.299216 kernel: pcpu-alloc: [0] 0 1 
Feb  9 19:26:35.299230 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0
Feb  9 19:26:35.299244 kernel: kvm-guest: PV spinlocks enabled
Feb  9 19:26:35.299258 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Feb  9 19:26:35.299272 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 506242
Feb  9 19:26:35.299286 kernel: Policy zone: DMA32
Feb  9 19:26:35.299303 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6
Feb  9 19:26:35.299320 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Feb  9 19:26:35.299334 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Feb  9 19:26:35.299348 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Feb  9 19:26:35.299362 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Feb  9 19:26:35.299377 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved)
Feb  9 19:26:35.299391 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Feb  9 19:26:35.299405 kernel: Kernel/User page tables isolation: enabled
Feb  9 19:26:35.299419 kernel: ftrace: allocating 34475 entries in 135 pages
Feb  9 19:26:35.299436 kernel: ftrace: allocated 135 pages with 4 groups
Feb  9 19:26:35.299450 kernel: rcu: Hierarchical RCU implementation.
Feb  9 19:26:35.299465 kernel: rcu:         RCU event tracing is enabled.
Feb  9 19:26:35.299480 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
Feb  9 19:26:35.299494 kernel:         Rude variant of Tasks RCU enabled.
Feb  9 19:26:35.299508 kernel:         Tracing variant of Tasks RCU enabled.
Feb  9 19:26:35.299523 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Feb  9 19:26:35.299736 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
Feb  9 19:26:35.299761 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16
Feb  9 19:26:35.299781 kernel: random: crng init done
Feb  9 19:26:35.299796 kernel: Console: colour VGA+ 80x25
Feb  9 19:26:35.299810 kernel: printk: console [ttyS0] enabled
Feb  9 19:26:35.299825 kernel: ACPI: Core revision 20210730
Feb  9 19:26:35.299840 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns
Feb  9 19:26:35.299854 kernel: APIC: Switch to symmetric I/O mode setup
Feb  9 19:26:35.299868 kernel: x2apic enabled
Feb  9 19:26:35.299882 kernel: Switched APIC routing to physical x2apic.
Feb  9 19:26:35.299897 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns
Feb  9 19:26:35.299914 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996)
Feb  9 19:26:35.299928 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Feb  9 19:26:35.299948 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Feb  9 19:26:35.299963 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Feb  9 19:26:35.299988 kernel: Spectre V2 : Mitigation: Retpolines
Feb  9 19:26:35.300005 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Feb  9 19:26:35.300020 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Feb  9 19:26:35.300035 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible!
Feb  9 19:26:35.300050 kernel: RETBleed: Vulnerable
Feb  9 19:26:35.300065 kernel: Speculative Store Bypass: Vulnerable
Feb  9 19:26:35.300079 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode
Feb  9 19:26:35.300094 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode
Feb  9 19:26:35.300109 kernel: GDS: Unknown: Dependent on hypervisor status
Feb  9 19:26:35.300124 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Feb  9 19:26:35.300143 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Feb  9 19:26:35.300158 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Feb  9 19:26:35.300173 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Feb  9 19:26:35.300188 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Feb  9 19:26:35.300202 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Feb  9 19:26:35.300217 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Feb  9 19:26:35.300234 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Feb  9 19:26:35.300249 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers'
Feb  9 19:26:35.300264 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Feb  9 19:26:35.300279 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Feb  9 19:26:35.300294 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Feb  9 19:26:35.300308 kernel: x86/fpu: xstate_offset[5]:  960, xstate_sizes[5]:   64
Feb  9 19:26:35.300323 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]:  512
Feb  9 19:26:35.300337 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
Feb  9 19:26:35.300352 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]:    8
Feb  9 19:26:35.300367 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format.
Feb  9 19:26:35.300381 kernel: Freeing SMP alternatives memory: 32K
Feb  9 19:26:35.300399 kernel: pid_max: default: 32768 minimum: 301
Feb  9 19:26:35.300413 kernel: LSM: Security Framework initializing
Feb  9 19:26:35.300428 kernel: SELinux:  Initializing.
Feb  9 19:26:35.300443 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Feb  9 19:26:35.300458 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Feb  9 19:26:35.300473 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7)
Feb  9 19:26:35.300488 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Feb  9 19:26:35.300503 kernel: signal: max sigframe size: 3632
Feb  9 19:26:35.300518 kernel: rcu: Hierarchical SRCU implementation.
Feb  9 19:26:35.300533 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Feb  9 19:26:35.300550 kernel: smp: Bringing up secondary CPUs ...
Feb  9 19:26:35.300565 kernel: x86: Booting SMP configuration:
Feb  9 19:26:35.300581 kernel: .... node  #0, CPUs:      #1
Feb  9 19:26:35.300596 kernel: kvm-clock: cpu 1, msr 6efaa041, secondary cpu clock
Feb  9 19:26:35.300610 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0
Feb  9 19:26:35.300627 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
Feb  9 19:26:35.300644 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Feb  9 19:26:35.300659 kernel: smp: Brought up 1 node, 2 CPUs
Feb  9 19:26:35.300674 kernel: smpboot: Max logical packages: 1
Feb  9 19:26:35.300702 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS)
Feb  9 19:26:35.300718 kernel: devtmpfs: initialized
Feb  9 19:26:35.300733 kernel: x86/mm: Memory block size: 128MB
Feb  9 19:26:35.300749 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Feb  9 19:26:35.300764 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear)
Feb  9 19:26:35.300780 kernel: pinctrl core: initialized pinctrl subsystem
Feb  9 19:26:35.300796 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Feb  9 19:26:35.300811 kernel: audit: initializing netlink subsys (disabled)
Feb  9 19:26:35.300826 kernel: audit: type=2000 audit(1707506793.549:1): state=initialized audit_enabled=0 res=1
Feb  9 19:26:35.300844 kernel: thermal_sys: Registered thermal governor 'step_wise'
Feb  9 19:26:35.300861 kernel: thermal_sys: Registered thermal governor 'user_space'
Feb  9 19:26:35.300876 kernel: cpuidle: using governor menu
Feb  9 19:26:35.300891 kernel: ACPI: bus type PCI registered
Feb  9 19:26:35.300906 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Feb  9 19:26:35.300921 kernel: dca service started, version 1.12.1
Feb  9 19:26:35.301050 kernel: PCI: Using configuration type 1 for base access
Feb  9 19:26:35.301070 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Feb  9 19:26:35.301084 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Feb  9 19:26:35.301103 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Feb  9 19:26:35.301119 kernel: ACPI: Added _OSI(Module Device)
Feb  9 19:26:35.301135 kernel: ACPI: Added _OSI(Processor Device)
Feb  9 19:26:35.301150 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Feb  9 19:26:35.301166 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Feb  9 19:26:35.301181 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Feb  9 19:26:35.301196 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Feb  9 19:26:35.301210 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Feb  9 19:26:35.301226 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded
Feb  9 19:26:35.301244 kernel: ACPI: Interpreter enabled
Feb  9 19:26:35.301259 kernel: ACPI: PM: (supports S0 S5)
Feb  9 19:26:35.301275 kernel: ACPI: Using IOAPIC for interrupt routing
Feb  9 19:26:35.301290 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Feb  9 19:26:35.301306 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F
Feb  9 19:26:35.301326 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Feb  9 19:26:35.301538 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Feb  9 19:26:35.316023 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Feb  9 19:26:35.316067 kernel: acpiphp: Slot [3] registered
Feb  9 19:26:35.316083 kernel: acpiphp: Slot [4] registered
Feb  9 19:26:35.316098 kernel: acpiphp: Slot [5] registered
Feb  9 19:26:35.316112 kernel: acpiphp: Slot [6] registered
Feb  9 19:26:35.316127 kernel: acpiphp: Slot [7] registered
Feb  9 19:26:35.316141 kernel: acpiphp: Slot [8] registered
Feb  9 19:26:35.316156 kernel: acpiphp: Slot [9] registered
Feb  9 19:26:35.316171 kernel: acpiphp: Slot [10] registered
Feb  9 19:26:35.316185 kernel: acpiphp: Slot [11] registered
Feb  9 19:26:35.316202 kernel: acpiphp: Slot [12] registered
Feb  9 19:26:35.316217 kernel: acpiphp: Slot [13] registered
Feb  9 19:26:35.316231 kernel: acpiphp: Slot [14] registered
Feb  9 19:26:35.316246 kernel: acpiphp: Slot [15] registered
Feb  9 19:26:35.316260 kernel: acpiphp: Slot [16] registered
Feb  9 19:26:35.316275 kernel: acpiphp: Slot [17] registered
Feb  9 19:26:35.316290 kernel: acpiphp: Slot [18] registered
Feb  9 19:26:35.316304 kernel: acpiphp: Slot [19] registered
Feb  9 19:26:35.316318 kernel: acpiphp: Slot [20] registered
Feb  9 19:26:35.316335 kernel: acpiphp: Slot [21] registered
Feb  9 19:26:35.316349 kernel: acpiphp: Slot [22] registered
Feb  9 19:26:35.316364 kernel: acpiphp: Slot [23] registered
Feb  9 19:26:35.316378 kernel: acpiphp: Slot [24] registered
Feb  9 19:26:35.316393 kernel: acpiphp: Slot [25] registered
Feb  9 19:26:35.316407 kernel: acpiphp: Slot [26] registered
Feb  9 19:26:35.316421 kernel: acpiphp: Slot [27] registered
Feb  9 19:26:35.316435 kernel: acpiphp: Slot [28] registered
Feb  9 19:26:35.316449 kernel: acpiphp: Slot [29] registered
Feb  9 19:26:35.316463 kernel: acpiphp: Slot [30] registered
Feb  9 19:26:35.316480 kernel: acpiphp: Slot [31] registered
Feb  9 19:26:35.316494 kernel: PCI host bridge to bus 0000:00
Feb  9 19:26:35.316690 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Feb  9 19:26:35.316925 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Feb  9 19:26:35.317052 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Feb  9 19:26:35.317158 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window]
Feb  9 19:26:35.317262 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Feb  9 19:26:35.317403 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
Feb  9 19:26:35.317533 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100
Feb  9 19:26:35.317986 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000
Feb  9 19:26:35.318163 kernel: pci 0000:00:01.3: quirk: [io  0xb000-0xb03f] claimed by PIIX4 ACPI
Feb  9 19:26:35.318290 kernel: pci 0000:00:01.3: quirk: [io  0xb100-0xb10f] claimed by PIIX4 SMB
Feb  9 19:26:35.318411 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff
Feb  9 19:26:35.318531 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff
Feb  9 19:26:35.318656 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff
Feb  9 19:26:35.318788 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff
Feb  9 19:26:35.319435 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff
Feb  9 19:26:35.319571 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff
Feb  9 19:26:35.321787 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 15625 usecs
Feb  9 19:26:35.321951 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000
Feb  9 19:26:35.322084 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref]
Feb  9 19:26:35.322217 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref]
Feb  9 19:26:35.322339 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Feb  9 19:26:35.322467 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802
Feb  9 19:26:35.322583 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff]
Feb  9 19:26:35.322716 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000
Feb  9 19:26:35.322835 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff]
Feb  9 19:26:35.322863 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10
Feb  9 19:26:35.322878 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10
Feb  9 19:26:35.322892 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11
Feb  9 19:26:35.322905 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11
Feb  9 19:26:35.322919 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9
Feb  9 19:26:35.322933 kernel: iommu: Default domain type: Translated 
Feb  9 19:26:35.322947 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Feb  9 19:26:35.323062 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device
Feb  9 19:26:35.323177 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Feb  9 19:26:35.323300 kernel: pci 0000:00:03.0: vgaarb: bridge control possible
Feb  9 19:26:35.323318 kernel: vgaarb: loaded
Feb  9 19:26:35.323332 kernel: pps_core: LinuxPPS API ver. 1 registered
Feb  9 19:26:35.323347 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Feb  9 19:26:35.323362 kernel: PTP clock support registered
Feb  9 19:26:35.323376 kernel: PCI: Using ACPI for IRQ routing
Feb  9 19:26:35.323391 kernel: PCI: pci_cache_line_size set to 64 bytes
Feb  9 19:26:35.323406 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff]
Feb  9 19:26:35.323424 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff]
Feb  9 19:26:35.323438 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0
Feb  9 19:26:35.323453 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter
Feb  9 19:26:35.323468 kernel: clocksource: Switched to clocksource kvm-clock
Feb  9 19:26:35.323483 kernel: VFS: Disk quotas dquot_6.6.0
Feb  9 19:26:35.323498 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Feb  9 19:26:35.323513 kernel: pnp: PnP ACPI init
Feb  9 19:26:35.323535 kernel: pnp: PnP ACPI: found 5 devices
Feb  9 19:26:35.323553 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Feb  9 19:26:35.323569 kernel: NET: Registered PF_INET protocol family
Feb  9 19:26:35.323582 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear)
Feb  9 19:26:35.323597 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear)
Feb  9 19:26:35.323611 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Feb  9 19:26:35.323624 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear)
Feb  9 19:26:35.331743 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear)
Feb  9 19:26:35.331897 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Feb  9 19:26:35.331916 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear)
Feb  9 19:26:35.331932 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear)
Feb  9 19:26:35.331956 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Feb  9 19:26:35.331971 kernel: NET: Registered PF_XDP protocol family
Feb  9 19:26:35.332296 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Feb  9 19:26:35.332437 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Feb  9 19:26:35.332552 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Feb  9 19:26:35.332664 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window]
Feb  9 19:26:35.332949 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Feb  9 19:26:35.333132 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds
Feb  9 19:26:35.333222 kernel: PCI: CLS 0 bytes, default 64
Feb  9 19:26:35.333240 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Feb  9 19:26:35.333255 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns
Feb  9 19:26:35.333353 kernel: clocksource: Switched to clocksource tsc
Feb  9 19:26:35.333371 kernel: Initialise system trusted keyrings
Feb  9 19:26:35.333387 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0
Feb  9 19:26:35.333434 kernel: Key type asymmetric registered
Feb  9 19:26:35.333449 kernel: Asymmetric key parser 'x509' registered
Feb  9 19:26:35.333468 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Feb  9 19:26:35.333484 kernel: io scheduler mq-deadline registered
Feb  9 19:26:35.333498 kernel: io scheduler kyber registered
Feb  9 19:26:35.333513 kernel: io scheduler bfq registered
Feb  9 19:26:35.333528 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Feb  9 19:26:35.333542 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Feb  9 19:26:35.333557 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Feb  9 19:26:35.333573 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
Feb  9 19:26:35.333588 kernel: i8042: Warning: Keylock active
Feb  9 19:26:35.333605 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Feb  9 19:26:35.333620 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Feb  9 19:26:35.337934 kernel: rtc_cmos 00:00: RTC can wake from S4
Feb  9 19:26:35.338081 kernel: rtc_cmos 00:00: registered as rtc0
Feb  9 19:26:35.338200 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T19:26:34 UTC (1707506794)
Feb  9 19:26:35.338314 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram
Feb  9 19:26:35.338333 kernel: intel_pstate: CPU model not supported
Feb  9 19:26:35.338349 kernel: NET: Registered PF_INET6 protocol family
Feb  9 19:26:35.338373 kernel: Segment Routing with IPv6
Feb  9 19:26:35.338387 kernel: In-situ OAM (IOAM) with IPv6
Feb  9 19:26:35.338402 kernel: NET: Registered PF_PACKET protocol family
Feb  9 19:26:35.338417 kernel: Key type dns_resolver registered
Feb  9 19:26:35.338432 kernel: IPI shorthand broadcast: enabled
Feb  9 19:26:35.338446 kernel: sched_clock: Marking stable (490327541, 339438352)->(957055852, -127289959)
Feb  9 19:26:35.338461 kernel: registered taskstats version 1
Feb  9 19:26:35.338476 kernel: Loading compiled-in X.509 certificates
Feb  9 19:26:35.338491 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a'
Feb  9 19:26:35.338508 kernel: Key type .fscrypt registered
Feb  9 19:26:35.338522 kernel: Key type fscrypt-provisioning registered
Feb  9 19:26:35.338538 kernel: ima: No TPM chip found, activating TPM-bypass!
Feb  9 19:26:35.338553 kernel: ima: Allocated hash algorithm: sha1
Feb  9 19:26:35.338567 kernel: ima: No architecture policies found
Feb  9 19:26:35.338583 kernel: Freeing unused kernel image (initmem) memory: 45496K
Feb  9 19:26:35.338598 kernel: Write protecting the kernel read-only data: 28672k
Feb  9 19:26:35.338613 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Feb  9 19:26:35.338628 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K
Feb  9 19:26:35.338645 kernel: Run /init as init process
Feb  9 19:26:35.338660 kernel:   with arguments:
Feb  9 19:26:35.338675 kernel:     /init
Feb  9 19:26:35.341764 kernel:   with environment:
Feb  9 19:26:35.341785 kernel:     HOME=/
Feb  9 19:26:35.341801 kernel:     TERM=linux
Feb  9 19:26:35.341816 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Feb  9 19:26:35.341836 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Feb  9 19:26:35.341864 systemd[1]: Detected virtualization amazon.
Feb  9 19:26:35.341881 systemd[1]: Detected architecture x86-64.
Feb  9 19:26:35.341896 systemd[1]: Running in initrd.
Feb  9 19:26:35.341912 systemd[1]: No hostname configured, using default hostname.
Feb  9 19:26:35.341943 systemd[1]: Hostname set to <localhost>.
Feb  9 19:26:35.341965 systemd[1]: Initializing machine ID from VM UUID.
Feb  9 19:26:35.341981 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0
Feb  9 19:26:35.341998 systemd[1]: Queued start job for default target initrd.target.
Feb  9 19:26:35.342014 systemd[1]: Started systemd-ask-password-console.path.
Feb  9 19:26:35.342029 systemd[1]: Reached target cryptsetup.target.
Feb  9 19:26:35.342046 systemd[1]: Reached target paths.target.
Feb  9 19:26:35.342062 systemd[1]: Reached target slices.target.
Feb  9 19:26:35.342078 systemd[1]: Reached target swap.target.
Feb  9 19:26:35.342094 systemd[1]: Reached target timers.target.
Feb  9 19:26:35.342116 systemd[1]: Listening on iscsid.socket.
Feb  9 19:26:35.342133 systemd[1]: Listening on iscsiuio.socket.
Feb  9 19:26:35.342149 systemd[1]: Listening on systemd-journald-audit.socket.
Feb  9 19:26:35.342166 systemd[1]: Listening on systemd-journald-dev-log.socket.
Feb  9 19:26:35.342183 systemd[1]: Listening on systemd-journald.socket.
Feb  9 19:26:35.342199 systemd[1]: Listening on systemd-networkd.socket.
Feb  9 19:26:35.342215 systemd[1]: Listening on systemd-udevd-control.socket.
Feb  9 19:26:35.342232 systemd[1]: Listening on systemd-udevd-kernel.socket.
Feb  9 19:26:35.342252 systemd[1]: Reached target sockets.target.
Feb  9 19:26:35.342269 systemd[1]: Starting kmod-static-nodes.service...
Feb  9 19:26:35.342285 systemd[1]: Finished network-cleanup.service.
Feb  9 19:26:35.342302 systemd[1]: Starting systemd-fsck-usr.service...
Feb  9 19:26:35.342319 systemd[1]: Starting systemd-journald.service...
Feb  9 19:26:35.342334 systemd[1]: Starting systemd-modules-load.service...
Feb  9 19:26:35.342351 systemd[1]: Starting systemd-resolved.service...
Feb  9 19:26:35.342367 systemd[1]: Starting systemd-vconsole-setup.service...
Feb  9 19:26:35.342384 systemd[1]: Finished kmod-static-nodes.service.
Feb  9 19:26:35.342403 systemd[1]: Finished systemd-fsck-usr.service.
Feb  9 19:26:35.342419 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Feb  9 19:26:35.342435 kernel: Bridge firewalling registered
Feb  9 19:26:35.342458 systemd-journald[185]: Journal started
Feb  9 19:26:35.342552 systemd-journald[185]: Runtime Journal (/run/log/journal/ec28f6389bbcdf530598d30edf29e949) is 4.8M, max 38.7M, 33.9M free.
Feb  9 19:26:35.276708 systemd-modules-load[186]: Inserted module 'overlay'
Feb  9 19:26:35.516846 kernel: SCSI subsystem initialized
Feb  9 19:26:35.516872 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Feb  9 19:26:35.516892 kernel: device-mapper: uevent: version 1.0.3
Feb  9 19:26:35.516906 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Feb  9 19:26:35.327735 systemd-modules-load[186]: Inserted module 'br_netfilter'
Feb  9 19:26:35.522864 systemd[1]: Started systemd-journald.service.
Feb  9 19:26:35.522899 kernel: audit: type=1130 audit(1707506795.515:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.395788 systemd-modules-load[186]: Inserted module 'dm_multipath'
Feb  9 19:26:35.400038 systemd-resolved[187]: Positive Trust Anchors:
Feb  9 19:26:35.540672 kernel: audit: type=1130 audit(1707506795.525:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.540726 kernel: audit: type=1130 audit(1707506795.526:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.400057 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Feb  9 19:26:35.400106 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Feb  9 19:26:35.567694 kernel: audit: type=1130 audit(1707506795.539:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.567789 kernel: audit: type=1130 audit(1707506795.542:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.405837 systemd-resolved[187]: Defaulting to hostname 'linux'.
Feb  9 19:26:35.526537 systemd[1]: Started systemd-resolved.service.
Feb  9 19:26:35.528134 systemd[1]: Finished systemd-modules-load.service.
Feb  9 19:26:35.541001 systemd[1]: Finished systemd-vconsole-setup.service.
Feb  9 19:26:35.544265 systemd[1]: Reached target nss-lookup.target.
Feb  9 19:26:35.562317 systemd[1]: Starting dracut-cmdline-ask.service...
Feb  9 19:26:35.563137 systemd[1]: Starting systemd-sysctl.service...
Feb  9 19:26:35.588063 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Feb  9 19:26:35.601165 systemd[1]: Finished systemd-sysctl.service.
Feb  9 19:26:35.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.606575 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Feb  9 19:26:35.632750 kernel: audit: type=1130 audit(1707506795.601:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.632786 kernel: audit: type=1130 audit(1707506795.610:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.632808 kernel: audit: type=1130 audit(1707506795.622:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.612044 systemd[1]: Finished dracut-cmdline-ask.service.
Feb  9 19:26:35.630172 systemd[1]: Starting dracut-cmdline.service...
Feb  9 19:26:35.642453 dracut-cmdline[207]: dracut-dracut-053
Feb  9 19:26:35.645790 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6
Feb  9 19:26:35.736877 kernel: Loading iSCSI transport class v2.0-870.
Feb  9 19:26:35.751784 kernel: iscsi: registered transport (tcp)
Feb  9 19:26:35.791763 kernel: iscsi: registered transport (qla4xxx)
Feb  9 19:26:35.791866 kernel: QLogic iSCSI HBA Driver
Feb  9 19:26:35.829143 systemd[1]: Finished dracut-cmdline.service.
Feb  9 19:26:35.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.832523 systemd[1]: Starting dracut-pre-udev.service...
Feb  9 19:26:35.839965 kernel: audit: type=1130 audit(1707506795.829:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:35.897764 kernel: raid6: avx512x4 gen() 10981 MB/s
Feb  9 19:26:35.915731 kernel: raid6: avx512x4 xor()  4991 MB/s
Feb  9 19:26:35.934878 kernel: raid6: avx512x2 gen()  8847 MB/s
Feb  9 19:26:35.952717 kernel: raid6: avx512x2 xor() 15623 MB/s
Feb  9 19:26:35.970752 kernel: raid6: avx512x1 gen() 11462 MB/s
Feb  9 19:26:35.988735 kernel: raid6: avx512x1 xor() 13721 MB/s
Feb  9 19:26:36.006882 kernel: raid6: avx2x4   gen() 14250 MB/s
Feb  9 19:26:36.024734 kernel: raid6: avx2x4   xor()  4175 MB/s
Feb  9 19:26:36.042748 kernel: raid6: avx2x2   gen()  9628 MB/s
Feb  9 19:26:36.060758 kernel: raid6: avx2x2   xor() 13648 MB/s
Feb  9 19:26:36.081769 kernel: raid6: avx2x1   gen() 11342 MB/s
Feb  9 19:26:36.098737 kernel: raid6: avx2x1   xor() 11644 MB/s
Feb  9 19:26:36.117740 kernel: raid6: sse2x4   gen()  3275 MB/s
Feb  9 19:26:36.135755 kernel: raid6: sse2x4   xor()  4376 MB/s
Feb  9 19:26:36.153767 kernel: raid6: sse2x2   gen()  7283 MB/s
Feb  9 19:26:36.171733 kernel: raid6: sse2x2   xor()  4540 MB/s
Feb  9 19:26:36.189731 kernel: raid6: sse2x1   gen()  7356 MB/s
Feb  9 19:26:36.211599 kernel: raid6: sse2x1   xor()  3585 MB/s
Feb  9 19:26:36.211678 kernel: raid6: using algorithm avx2x4 gen() 14250 MB/s
Feb  9 19:26:36.211709 kernel: raid6: .... xor() 4175 MB/s, rmw enabled
Feb  9 19:26:36.212866 kernel: raid6: using avx512x2 recovery algorithm
Feb  9 19:26:36.231716 kernel: xor: automatically using best checksumming function   avx       
Feb  9 19:26:36.412713 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Feb  9 19:26:36.424471 systemd[1]: Finished dracut-pre-udev.service.
Feb  9 19:26:36.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:36.425000 audit: BPF prog-id=7 op=LOAD
Feb  9 19:26:36.425000 audit: BPF prog-id=8 op=LOAD
Feb  9 19:26:36.427218 systemd[1]: Starting systemd-udevd.service...
Feb  9 19:26:36.442594 systemd-udevd[385]: Using default interface naming scheme 'v252'.
Feb  9 19:26:36.449750 systemd[1]: Started systemd-udevd.service.
Feb  9 19:26:36.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:36.452930 systemd[1]: Starting dracut-pre-trigger.service...
Feb  9 19:26:36.475528 dracut-pre-trigger[395]: rd.md=0: removing MD RAID activation
Feb  9 19:26:36.514360 systemd[1]: Finished dracut-pre-trigger.service.
Feb  9 19:26:36.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:36.515419 systemd[1]: Starting systemd-udev-trigger.service...
Feb  9 19:26:36.572607 systemd[1]: Finished systemd-udev-trigger.service.
Feb  9 19:26:36.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:36.664457 kernel: cryptd: max_cpu_qlen set to 1000
Feb  9 19:26:36.690816 kernel: AVX2 version of gcm_enc/dec engaged.
Feb  9 19:26:36.690933 kernel: AES CTR mode by8 optimization enabled
Feb  9 19:26:36.705151 kernel: nvme nvme0: pci function 0000:00:04.0
Feb  9 19:26:36.705475 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11
Feb  9 19:26:36.706699 kernel: ena 0000:00:05.0: ENA device version: 0.10
Feb  9 19:26:36.706906 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1
Feb  9 19:26:36.710340 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy.
Feb  9 19:26:36.715710 kernel: nvme nvme0: 2/0/0 default/read/poll queues
Feb  9 19:26:36.716699 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:f5:b3:2d:db:9f
Feb  9 19:26:36.721329 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Feb  9 19:26:36.721377 kernel: GPT:9289727 != 16777215
Feb  9 19:26:36.721397 kernel: GPT:Alternate GPT header not at the end of the disk.
Feb  9 19:26:36.721525 kernel: GPT:9289727 != 16777215
Feb  9 19:26:36.721545 kernel: GPT: Use GNU Parted to correct GPT errors.
Feb  9 19:26:36.721563 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Feb  9 19:26:36.725428 (udev-worker)[443]: Network interface NamePolicy= disabled on kernel command line.
Feb  9 19:26:36.948583 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (441)
Feb  9 19:26:36.867256 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Feb  9 19:26:36.959444 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Feb  9 19:26:36.990461 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Feb  9 19:26:36.990588 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Feb  9 19:26:36.997876 systemd[1]: Starting disk-uuid.service...
Feb  9 19:26:37.007212 disk-uuid[583]: Primary Header is updated.
Feb  9 19:26:37.007212 disk-uuid[583]: Secondary Entries is updated.
Feb  9 19:26:37.007212 disk-uuid[583]: Secondary Header is updated.
Feb  9 19:26:37.189377 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Feb  9 19:26:38.019705 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Feb  9 19:26:38.020428 disk-uuid[584]: The operation has completed successfully.
Feb  9 19:26:38.158484 systemd[1]: disk-uuid.service: Deactivated successfully.
Feb  9 19:26:38.159185 systemd[1]: Finished disk-uuid.service.
Feb  9 19:26:38.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:38.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:38.191646 systemd[1]: Starting verity-setup.service...
Feb  9 19:26:38.260087 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2"
Feb  9 19:26:38.465983 systemd[1]: Found device dev-mapper-usr.device.
Feb  9 19:26:38.470761 systemd[1]: Finished verity-setup.service.
Feb  9 19:26:38.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:38.475262 systemd[1]: Mounting sysusr-usr.mount...
Feb  9 19:26:38.589952 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Feb  9 19:26:38.591001 systemd[1]: Mounted sysusr-usr.mount.
Feb  9 19:26:38.591485 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Feb  9 19:26:38.593122 systemd[1]: Starting ignition-setup.service...
Feb  9 19:26:38.599820 systemd[1]: Starting parse-ip-for-networkd.service...
Feb  9 19:26:38.623761 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Feb  9 19:26:38.623842 kernel: BTRFS info (device nvme0n1p6): using free space tree
Feb  9 19:26:38.624282 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Feb  9 19:26:38.633729 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Feb  9 19:26:38.658141 systemd[1]: mnt-oem.mount: Deactivated successfully.
Feb  9 19:26:38.724634 systemd[1]: Finished parse-ip-for-networkd.service.
Feb  9 19:26:38.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:38.726000 audit: BPF prog-id=9 op=LOAD
Feb  9 19:26:38.729960 systemd[1]: Starting systemd-networkd.service...
Feb  9 19:26:38.745350 systemd[1]: Finished ignition-setup.service.
Feb  9 19:26:38.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:38.753484 systemd[1]: Starting ignition-fetch-offline.service...
Feb  9 19:26:38.778009 systemd-networkd[1022]: lo: Link UP
Feb  9 19:26:38.778021 systemd-networkd[1022]: lo: Gained carrier
Feb  9 19:26:38.781034 systemd-networkd[1022]: Enumeration completed
Feb  9 19:26:38.782812 systemd[1]: Started systemd-networkd.service.
Feb  9 19:26:38.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:38.785345 systemd[1]: Reached target network.target.
Feb  9 19:26:38.785420 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Feb  9 19:26:38.791306 systemd[1]: Starting iscsiuio.service...
Feb  9 19:26:38.793054 systemd-networkd[1022]: eth0: Link UP
Feb  9 19:26:38.793059 systemd-networkd[1022]: eth0: Gained carrier
Feb  9 19:26:38.798914 systemd[1]: Started iscsiuio.service.
Feb  9 19:26:38.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:38.802488 systemd[1]: Starting iscsid.service...
Feb  9 19:26:38.807014 iscsid[1029]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Feb  9 19:26:38.807014 iscsid[1029]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Feb  9 19:26:38.807014 iscsid[1029]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Feb  9 19:26:38.807014 iscsid[1029]: If using hardware iscsi like qla4xxx this message can be ignored.
Feb  9 19:26:38.807014 iscsid[1029]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Feb  9 19:26:38.807014 iscsid[1029]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Feb  9 19:26:38.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:38.809651 systemd[1]: Started iscsid.service.
Feb  9 19:26:38.820210 systemd[1]: Starting dracut-initqueue.service...
Feb  9 19:26:38.837843 systemd-networkd[1022]: eth0: DHCPv4 address 172.31.21.113/20, gateway 172.31.16.1 acquired from 172.31.16.1
Feb  9 19:26:38.861781 systemd[1]: Finished dracut-initqueue.service.
Feb  9 19:26:38.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:38.864267 systemd[1]: Reached target remote-fs-pre.target.
Feb  9 19:26:38.866378 systemd[1]: Reached target remote-cryptsetup.target.
Feb  9 19:26:38.869011 systemd[1]: Reached target remote-fs.target.
Feb  9 19:26:38.871892 systemd[1]: Starting dracut-pre-mount.service...
Feb  9 19:26:38.885562 systemd[1]: Finished dracut-pre-mount.service.
Feb  9 19:26:38.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:40.306885 systemd-networkd[1022]: eth0: Gained IPv6LL
Feb  9 19:26:41.286191 ignition[1024]: Ignition 2.14.0
Feb  9 19:26:41.286204 ignition[1024]: Stage: fetch-offline
Feb  9 19:26:41.286360 ignition[1024]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 19:26:41.286404 ignition[1024]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 19:26:41.304103 ignition[1024]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 19:26:41.307507 ignition[1024]: Ignition finished successfully
Feb  9 19:26:41.310939 systemd[1]: Finished ignition-fetch-offline.service.
Feb  9 19:26:41.322562 kernel: kauditd_printk_skb: 17 callbacks suppressed
Feb  9 19:26:41.322636 kernel: audit: type=1130 audit(1707506801.313:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.315853 systemd[1]: Starting ignition-fetch.service...
Feb  9 19:26:41.341404 ignition[1048]: Ignition 2.14.0
Feb  9 19:26:41.341418 ignition[1048]: Stage: fetch
Feb  9 19:26:41.341649 ignition[1048]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 19:26:41.341787 ignition[1048]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 19:26:41.353936 ignition[1048]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 19:26:41.355995 ignition[1048]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 19:26:41.365470 ignition[1048]: INFO     : PUT result: OK
Feb  9 19:26:41.368124 ignition[1048]: DEBUG    : parsed url from cmdline: ""
Feb  9 19:26:41.369430 ignition[1048]: INFO     : no config URL provided
Feb  9 19:26:41.369430 ignition[1048]: INFO     : reading system config file "/usr/lib/ignition/user.ign"
Feb  9 19:26:41.369430 ignition[1048]: INFO     : no config at "/usr/lib/ignition/user.ign"
Feb  9 19:26:41.369430 ignition[1048]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 19:26:41.381031 ignition[1048]: INFO     : PUT result: OK
Feb  9 19:26:41.381031 ignition[1048]: INFO     : GET http://169.254.169.254/2019-10-01/user-data: attempt #1
Feb  9 19:26:41.389606 ignition[1048]: INFO     : GET result: OK
Feb  9 19:26:41.389606 ignition[1048]: DEBUG    : parsing config with SHA512: f4bb815c5efb350f6771e36f4378f3ebac659a36053c5a8d2b64751c5ff1bc7801d489031b1ec6df2d94c7d3bd83f8657eecd034e48941ad00c5e28513803df6
Feb  9 19:26:41.457012 unknown[1048]: fetched base config from "system"
Feb  9 19:26:41.457289 unknown[1048]: fetched base config from "system"
Feb  9 19:26:41.457298 unknown[1048]: fetched user config from "aws"
Feb  9 19:26:41.459791 ignition[1048]: fetch: fetch complete
Feb  9 19:26:41.459798 ignition[1048]: fetch: fetch passed
Feb  9 19:26:41.459859 ignition[1048]: Ignition finished successfully
Feb  9 19:26:41.465495 systemd[1]: Finished ignition-fetch.service.
Feb  9 19:26:41.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.467830 systemd[1]: Starting ignition-kargs.service...
Feb  9 19:26:41.474691 kernel: audit: type=1130 audit(1707506801.465:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.487140 ignition[1054]: Ignition 2.14.0
Feb  9 19:26:41.487623 ignition[1054]: Stage: kargs
Feb  9 19:26:41.489410 ignition[1054]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 19:26:41.489538 ignition[1054]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 19:26:41.498935 ignition[1054]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 19:26:41.503541 ignition[1054]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 19:26:41.505430 ignition[1054]: INFO     : PUT result: OK
Feb  9 19:26:41.509263 ignition[1054]: kargs: kargs passed
Feb  9 19:26:41.509333 ignition[1054]: Ignition finished successfully
Feb  9 19:26:41.512458 systemd[1]: Finished ignition-kargs.service.
Feb  9 19:26:41.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.515910 systemd[1]: Starting ignition-disks.service...
Feb  9 19:26:41.521780 kernel: audit: type=1130 audit(1707506801.512:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.529467 ignition[1060]: Ignition 2.14.0
Feb  9 19:26:41.529477 ignition[1060]: Stage: disks
Feb  9 19:26:41.529695 ignition[1060]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 19:26:41.529723 ignition[1060]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 19:26:41.542410 ignition[1060]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 19:26:41.544482 ignition[1060]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 19:26:41.546665 ignition[1060]: INFO     : PUT result: OK
Feb  9 19:26:41.550674 ignition[1060]: disks: disks passed
Feb  9 19:26:41.550744 ignition[1060]: Ignition finished successfully
Feb  9 19:26:41.553964 systemd[1]: Finished ignition-disks.service.
Feb  9 19:26:41.561178 kernel: audit: type=1130 audit(1707506801.553:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.555238 systemd[1]: Reached target initrd-root-device.target.
Feb  9 19:26:41.562501 systemd[1]: Reached target local-fs-pre.target.
Feb  9 19:26:41.565623 systemd[1]: Reached target local-fs.target.
Feb  9 19:26:41.567603 systemd[1]: Reached target sysinit.target.
Feb  9 19:26:41.568592 systemd[1]: Reached target basic.target.
Feb  9 19:26:41.571316 systemd[1]: Starting systemd-fsck-root.service...
Feb  9 19:26:41.650011 systemd-fsck[1068]: ROOT: clean, 602/553520 files, 56014/553472 blocks
Feb  9 19:26:41.655075 systemd[1]: Finished systemd-fsck-root.service.
Feb  9 19:26:41.677110 kernel: audit: type=1130 audit(1707506801.655:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:41.657317 systemd[1]: Mounting sysroot.mount...
Feb  9 19:26:41.695844 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Feb  9 19:26:41.696821 systemd[1]: Mounted sysroot.mount.
Feb  9 19:26:41.697034 systemd[1]: Reached target initrd-root-fs.target.
Feb  9 19:26:41.794841 systemd[1]: Mounting sysroot-usr.mount...
Feb  9 19:26:41.800582 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Feb  9 19:26:41.800645 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Feb  9 19:26:41.800699 systemd[1]: Reached target ignition-diskful.target.
Feb  9 19:26:41.805507 systemd[1]: Mounted sysroot-usr.mount.
Feb  9 19:26:41.823132 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Feb  9 19:26:41.826390 systemd[1]: Starting initrd-setup-root.service...
Feb  9 19:26:41.835100 initrd-setup-root[1090]: cut: /sysroot/etc/passwd: No such file or directory
Feb  9 19:26:41.844712 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1085)
Feb  9 19:26:41.848598 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Feb  9 19:26:41.848666 kernel: BTRFS info (device nvme0n1p6): using free space tree
Feb  9 19:26:41.848703 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Feb  9 19:26:41.857737 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Feb  9 19:26:41.860224 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Feb  9 19:26:41.926939 initrd-setup-root[1116]: cut: /sysroot/etc/group: No such file or directory
Feb  9 19:26:41.932648 initrd-setup-root[1124]: cut: /sysroot/etc/shadow: No such file or directory
Feb  9 19:26:41.945411 initrd-setup-root[1132]: cut: /sysroot/etc/gshadow: No such file or directory
Feb  9 19:26:42.476258 systemd[1]: Finished initrd-setup-root.service.
Feb  9 19:26:42.488940 kernel: audit: type=1130 audit(1707506802.475:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:42.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:42.479022 systemd[1]: Starting ignition-mount.service...
Feb  9 19:26:42.491421 systemd[1]: Starting sysroot-boot.service...
Feb  9 19:26:42.498405 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Feb  9 19:26:42.498539 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Feb  9 19:26:42.536588 systemd[1]: Finished sysroot-boot.service.
Feb  9 19:26:42.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:42.543905 kernel: audit: type=1130 audit(1707506802.536:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:42.608467 ignition[1153]: INFO     : Ignition 2.14.0
Feb  9 19:26:42.608467 ignition[1153]: INFO     : Stage: mount
Feb  9 19:26:42.611242 ignition[1153]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 19:26:42.611242 ignition[1153]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 19:26:42.620001 ignition[1153]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 19:26:42.622335 ignition[1153]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 19:26:42.624530 ignition[1153]: INFO     : PUT result: OK
Feb  9 19:26:42.629067 ignition[1153]: INFO     : mount: mount passed
Feb  9 19:26:42.630100 ignition[1153]: INFO     : Ignition finished successfully
Feb  9 19:26:42.632327 systemd[1]: Finished ignition-mount.service.
Feb  9 19:26:42.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:42.635362 systemd[1]: Starting ignition-files.service...
Feb  9 19:26:42.641854 kernel: audit: type=1130 audit(1707506802.632:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:42.648112 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Feb  9 19:26:42.663861 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1161)
Feb  9 19:26:42.667394 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Feb  9 19:26:42.667455 kernel: BTRFS info (device nvme0n1p6): using free space tree
Feb  9 19:26:42.667474 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Feb  9 19:26:42.674706 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Feb  9 19:26:42.678556 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Feb  9 19:26:42.693524 ignition[1180]: INFO     : Ignition 2.14.0
Feb  9 19:26:42.693524 ignition[1180]: INFO     : Stage: files
Feb  9 19:26:42.695873 ignition[1180]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 19:26:42.695873 ignition[1180]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 19:26:42.706032 ignition[1180]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 19:26:42.707678 ignition[1180]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 19:26:42.710036 ignition[1180]: INFO     : PUT result: OK
Feb  9 19:26:42.715167 ignition[1180]: DEBUG    : files: compiled without relabeling support, skipping
Feb  9 19:26:42.720790 ignition[1180]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Feb  9 19:26:42.720790 ignition[1180]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Feb  9 19:26:42.816366 ignition[1180]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Feb  9 19:26:42.818155 ignition[1180]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Feb  9 19:26:42.818155 ignition[1180]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Feb  9 19:26:42.818155 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Feb  9 19:26:42.818155 ignition[1180]: INFO     : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1
Feb  9 19:26:42.816945 unknown[1180]: wrote ssh authorized keys file for user: core
Feb  9 19:26:43.311560 ignition[1180]: INFO     : GET result: OK
Feb  9 19:26:43.599208 ignition[1180]: DEBUG    : file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d
Feb  9 19:26:43.602051 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Feb  9 19:26:43.602051 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz"
Feb  9 19:26:43.602051 ignition[1180]: INFO     : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1
Feb  9 19:26:43.737453 ignition[1180]: INFO     : GET result: OK
Feb  9 19:26:43.842877 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz"
Feb  9 19:26:43.845710 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz"
Feb  9 19:26:43.845710 ignition[1180]: INFO     : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1
Feb  9 19:26:44.248470 ignition[1180]: INFO     : GET result: OK
Feb  9 19:26:44.360484 ignition[1180]: DEBUG    : file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449
Feb  9 19:26:44.364381 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz"
Feb  9 19:26:44.364381 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/bin/kubectl"
Feb  9 19:26:44.370423 ignition[1180]: INFO     : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1
Feb  9 19:26:44.484545 ignition[1180]: INFO     : GET result: OK
Feb  9 19:26:44.804802 ignition[1180]: DEBUG    : file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628
Feb  9 19:26:44.808008 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl"
Feb  9 19:26:44.808008 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/etc/eks/bootstrap.sh"
Feb  9 19:26:44.808008 ignition[1180]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 19:26:44.819843 ignition[1180]: INFO     : op(1): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1991246147"
Feb  9 19:26:44.831553 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1180)
Feb  9 19:26:44.831589 ignition[1180]: CRITICAL : op(1): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem1991246147": device or resource busy
Feb  9 19:26:44.831589 ignition[1180]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1991246147", trying btrfs: device or resource busy
Feb  9 19:26:44.831589 ignition[1180]: INFO     : op(2): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1991246147"
Feb  9 19:26:44.838175 ignition[1180]: INFO     : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1991246147"
Feb  9 19:26:44.944647 ignition[1180]: INFO     : op(3): [started]  unmounting "/mnt/oem1991246147"
Feb  9 19:26:44.946340 ignition[1180]: INFO     : op(3): [finished] unmounting "/mnt/oem1991246147"
Feb  9 19:26:44.947862 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh"
Feb  9 19:26:44.947862 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/opt/bin/kubeadm"
Feb  9 19:26:44.947862 ignition[1180]: INFO     : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1
Feb  9 19:26:44.956813 systemd[1]: mnt-oem1991246147.mount: Deactivated successfully.
Feb  9 19:26:45.014069 ignition[1180]: INFO     : GET result: OK
Feb  9 19:26:45.339516 ignition[1180]: DEBUG    : file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660
Feb  9 19:26:45.342218 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm"
Feb  9 19:26:45.342218 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/opt/bin/kubelet"
Feb  9 19:26:45.342218 ignition[1180]: INFO     : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1
Feb  9 19:26:45.409280 ignition[1180]: INFO     : GET result: OK
Feb  9 19:26:46.293301 ignition[1180]: DEBUG    : file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing file "/sysroot/etc/docker/daemon.json"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [started]  writing file "/sysroot/home/core/install.sh"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(c): [started]  writing file "/sysroot/home/core/nginx.yaml"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(d): [started]  writing file "/sysroot/home/core/nfs-pod.yaml"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [started]  writing file "/sysroot/home/core/nfs-pvc.yaml"
Feb  9 19:26:46.296487 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml"
Feb  9 19:26:46.324714 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [started]  writing file "/sysroot/etc/flatcar/update.conf"
Feb  9 19:26:46.324714 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf"
Feb  9 19:26:46.324714 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(10): [started]  writing file "/sysroot/etc/systemd/system/nvidia.service"
Feb  9 19:26:46.324714 ignition[1180]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 19:26:46.342209 ignition[1180]: INFO     : op(4): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3299435066"
Feb  9 19:26:46.352331 ignition[1180]: CRITICAL : op(4): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem3299435066": device or resource busy
Feb  9 19:26:46.352331 ignition[1180]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3299435066", trying btrfs: device or resource busy
Feb  9 19:26:46.352331 ignition[1180]: INFO     : op(5): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3299435066"
Feb  9 19:26:46.352331 ignition[1180]: INFO     : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3299435066"
Feb  9 19:26:46.352331 ignition[1180]: INFO     : op(6): [started]  unmounting "/mnt/oem3299435066"
Feb  9 19:26:46.352331 ignition[1180]: INFO     : op(6): [finished] unmounting "/mnt/oem3299435066"
Feb  9 19:26:46.352331 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service"
Feb  9 19:26:46.352331 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(11): [started]  writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Feb  9 19:26:46.352331 ignition[1180]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 19:26:46.349601 systemd[1]: mnt-oem3299435066.mount: Deactivated successfully.
Feb  9 19:26:46.406884 ignition[1180]: INFO     : op(7): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3364077338"
Feb  9 19:26:46.406884 ignition[1180]: CRITICAL : op(7): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem3364077338": device or resource busy
Feb  9 19:26:46.406884 ignition[1180]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3364077338", trying btrfs: device or resource busy
Feb  9 19:26:46.406884 ignition[1180]: INFO     : op(8): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3364077338"
Feb  9 19:26:46.406884 ignition[1180]: INFO     : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3364077338"
Feb  9 19:26:46.406884 ignition[1180]: INFO     : op(9): [started]  unmounting "/mnt/oem3364077338"
Feb  9 19:26:46.420510 ignition[1180]: INFO     : op(9): [finished] unmounting "/mnt/oem3364077338"
Feb  9 19:26:46.420510 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Feb  9 19:26:46.420510 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(12): [started]  writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Feb  9 19:26:46.420510 ignition[1180]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 19:26:46.420510 ignition[1180]: INFO     : op(a): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1083269119"
Feb  9 19:26:46.420510 ignition[1180]: CRITICAL : op(a): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem1083269119": device or resource busy
Feb  9 19:26:46.420510 ignition[1180]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1083269119", trying btrfs: device or resource busy
Feb  9 19:26:46.420510 ignition[1180]: INFO     : op(b): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1083269119"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1083269119"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : op(c): [started]  unmounting "/mnt/oem1083269119"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : op(c): [finished] unmounting "/mnt/oem1083269119"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(13): [started]  processing unit "nvidia.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(13): [finished] processing unit "nvidia.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(14): [started]  processing unit "coreos-metadata-sshkeys@.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(14): [finished] processing unit "coreos-metadata-sshkeys@.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(15): [started]  processing unit "amazon-ssm-agent.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(15): op(16): [started]  writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(15): op(16): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(15): [finished] processing unit "amazon-ssm-agent.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(17): [started]  processing unit "prepare-critools.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(17): op(18): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(17): [finished] processing unit "prepare-critools.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(19): [started]  processing unit "prepare-helm.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(19): op(1a): [started]  writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(19): [finished] processing unit "prepare-helm.service"
Feb  9 19:26:46.440979 ignition[1180]: INFO     : files: op(1b): [started]  processing unit "prepare-cni-plugins.service"
Feb  9 19:26:46.497341 kernel: audit: type=1130 audit(1707506806.461:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(1b): op(1c): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(1b): op(1c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(1b): [finished] processing unit "prepare-cni-plugins.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(1d): [started]  setting preset to enabled for "amazon-ssm-agent.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(1d): [finished] setting preset to enabled for "amazon-ssm-agent.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(1e): [started]  setting preset to enabled for "prepare-critools.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(1e): [finished] setting preset to enabled for "prepare-critools.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(1f): [started]  setting preset to enabled for "prepare-helm.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(20): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(21): [started]  setting preset to enabled for "nvidia.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(21): [finished] setting preset to enabled for "nvidia.service"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(22): [started]  setting preset to enabled for "coreos-metadata-sshkeys@.service "
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: op(22): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service "
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: createResultFile: createFiles: op(23): [started]  writing file "/sysroot/etc/.ignition-result.json"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json"
Feb  9 19:26:46.497474 ignition[1180]: INFO     : files: files passed
Feb  9 19:26:46.497474 ignition[1180]: INFO     : Ignition finished successfully
Feb  9 19:26:46.544387 kernel: audit: type=1130 audit(1707506806.521:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.544427 kernel: audit: type=1131 audit(1707506806.521:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.544446 kernel: audit: type=1130 audit(1707506806.534:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.459584 systemd[1]: Finished ignition-files.service.
Feb  9 19:26:46.471398 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Feb  9 19:26:46.545444 initrd-setup-root-after-ignition[1205]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Feb  9 19:26:46.494818 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Feb  9 19:26:46.504960 systemd[1]: Starting ignition-quench.service...
Feb  9 19:26:46.512268 systemd[1]: ignition-quench.service: Deactivated successfully.
Feb  9 19:26:46.512416 systemd[1]: Finished ignition-quench.service.
Feb  9 19:26:46.525792 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Feb  9 19:26:46.542606 systemd[1]: Reached target ignition-complete.target.
Feb  9 19:26:46.563043 systemd[1]: Starting initrd-parse-etc.service...
Feb  9 19:26:46.586841 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Feb  9 19:26:46.602018 kernel: audit: type=1130 audit(1707506806.586:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.602050 kernel: audit: type=1131 audit(1707506806.586:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.586934 systemd[1]: Finished initrd-parse-etc.service.
Feb  9 19:26:46.602127 systemd[1]: Reached target initrd-fs.target.
Feb  9 19:26:46.611332 systemd[1]: Reached target initrd.target.
Feb  9 19:26:46.615075 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Feb  9 19:26:46.634449 systemd[1]: Starting dracut-pre-pivot.service...
Feb  9 19:26:46.659311 systemd[1]: Finished dracut-pre-pivot.service.
Feb  9 19:26:46.675253 kernel: audit: type=1130 audit(1707506806.659:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.666899 systemd[1]: Starting initrd-cleanup.service...
Feb  9 19:26:46.703737 systemd[1]: Stopped target nss-lookup.target.
Feb  9 19:26:46.704051 systemd[1]: Stopped target remote-cryptsetup.target.
Feb  9 19:26:46.708871 systemd[1]: Stopped target timers.target.
Feb  9 19:26:46.710691 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Feb  9 19:26:46.712422 systemd[1]: Stopped dracut-pre-pivot.service.
Feb  9 19:26:46.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.715078 systemd[1]: Stopped target initrd.target.
Feb  9 19:26:46.723615 kernel: audit: type=1131 audit(1707506806.713:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.725822 systemd[1]: Stopped target basic.target.
Feb  9 19:26:46.728264 systemd[1]: Stopped target ignition-complete.target.
Feb  9 19:26:46.730836 systemd[1]: Stopped target ignition-diskful.target.
Feb  9 19:26:46.733948 systemd[1]: Stopped target initrd-root-device.target.
Feb  9 19:26:46.734380 systemd[1]: Stopped target remote-fs.target.
Feb  9 19:26:46.739164 systemd[1]: Stopped target remote-fs-pre.target.
Feb  9 19:26:46.742495 systemd[1]: Stopped target sysinit.target.
Feb  9 19:26:46.744731 systemd[1]: Stopped target local-fs.target.
Feb  9 19:26:46.746741 systemd[1]: Stopped target local-fs-pre.target.
Feb  9 19:26:46.749609 systemd[1]: Stopped target swap.target.
Feb  9 19:26:46.752081 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Feb  9 19:26:46.753543 systemd[1]: Stopped dracut-pre-mount.service.
Feb  9 19:26:46.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.755910 systemd[1]: Stopped target cryptsetup.target.
Feb  9 19:26:46.760695 kernel: audit: type=1131 audit(1707506806.754:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.762799 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Feb  9 19:26:46.764247 systemd[1]: Stopped dracut-initqueue.service.
Feb  9 19:26:46.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.770374 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Feb  9 19:26:46.770982 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Feb  9 19:26:46.781531 kernel: audit: type=1131 audit(1707506806.767:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.781732 systemd[1]: ignition-files.service: Deactivated successfully.
Feb  9 19:26:46.784360 systemd[1]: Stopped ignition-files.service.
Feb  9 19:26:46.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.789104 systemd[1]: Stopping ignition-mount.service...
Feb  9 19:26:46.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.790945 systemd[1]: Stopping iscsiuio.service...
Feb  9 19:26:46.793421 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Feb  9 19:26:46.793731 systemd[1]: Stopped kmod-static-nodes.service.
Feb  9 19:26:46.801826 systemd[1]: Stopping sysroot-boot.service...
Feb  9 19:26:46.825904 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Feb  9 19:26:46.826629 systemd[1]: Stopped systemd-udev-trigger.service.
Feb  9 19:26:46.846664 ignition[1218]: INFO     : Ignition 2.14.0
Feb  9 19:26:46.846664 ignition[1218]: INFO     : Stage: umount
Feb  9 19:26:46.846664 ignition[1218]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 19:26:46.846664 ignition[1218]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 19:26:46.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.829311 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Feb  9 19:26:46.829528 systemd[1]: Stopped dracut-pre-trigger.service.
Feb  9 19:26:46.834938 systemd[1]: iscsiuio.service: Deactivated successfully.
Feb  9 19:26:46.835085 systemd[1]: Stopped iscsiuio.service.
Feb  9 19:26:46.851083 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Feb  9 19:26:46.851204 systemd[1]: Finished initrd-cleanup.service.
Feb  9 19:26:46.868100 ignition[1218]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 19:26:46.870261 ignition[1218]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 19:26:46.873111 ignition[1218]: INFO     : PUT result: OK
Feb  9 19:26:46.880826 ignition[1218]: INFO     : umount: umount passed
Feb  9 19:26:46.882505 ignition[1218]: INFO     : Ignition finished successfully
Feb  9 19:26:46.885880 systemd[1]: ignition-mount.service: Deactivated successfully.
Feb  9 19:26:46.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.887134 systemd[1]: Stopped ignition-mount.service.
Feb  9 19:26:46.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.889074 systemd[1]: ignition-disks.service: Deactivated successfully.
Feb  9 19:26:46.889142 systemd[1]: Stopped ignition-disks.service.
Feb  9 19:26:46.892840 systemd[1]: ignition-kargs.service: Deactivated successfully.
Feb  9 19:26:46.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.892946 systemd[1]: Stopped ignition-kargs.service.
Feb  9 19:26:46.900200 systemd[1]: ignition-fetch.service: Deactivated successfully.
Feb  9 19:26:46.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.900268 systemd[1]: Stopped ignition-fetch.service.
Feb  9 19:26:46.902562 systemd[1]: Stopped target network.target.
Feb  9 19:26:46.903974 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Feb  9 19:26:46.904052 systemd[1]: Stopped ignition-fetch-offline.service.
Feb  9 19:26:46.906735 systemd[1]: Stopped target paths.target.
Feb  9 19:26:46.909284 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Feb  9 19:26:46.911521 systemd[1]: Stopped systemd-ask-password-console.path.
Feb  9 19:26:46.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.912744 systemd[1]: Stopped target slices.target.
Feb  9 19:26:46.914800 systemd[1]: Stopped target sockets.target.
Feb  9 19:26:46.918467 systemd[1]: iscsid.socket: Deactivated successfully.
Feb  9 19:26:46.918517 systemd[1]: Closed iscsid.socket.
Feb  9 19:26:46.922814 systemd[1]: iscsiuio.socket: Deactivated successfully.
Feb  9 19:26:46.922872 systemd[1]: Closed iscsiuio.socket.
Feb  9 19:26:46.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.925138 systemd[1]: ignition-setup.service: Deactivated successfully.
Feb  9 19:26:46.925194 systemd[1]: Stopped ignition-setup.service.
Feb  9 19:26:46.927982 systemd[1]: Stopping systemd-networkd.service...
Feb  9 19:26:46.932344 systemd[1]: Stopping systemd-resolved.service...
Feb  9 19:26:46.935177 systemd-networkd[1022]: eth0: DHCPv6 lease lost
Feb  9 19:26:46.944000 audit: BPF prog-id=9 op=UNLOAD
Feb  9 19:26:46.935779 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Feb  9 19:26:46.936602 systemd[1]: systemd-networkd.service: Deactivated successfully.
Feb  9 19:26:46.936759 systemd[1]: Stopped systemd-networkd.service.
Feb  9 19:26:46.940794 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Feb  9 19:26:46.940829 systemd[1]: Closed systemd-networkd.socket.
Feb  9 19:26:46.950379 systemd[1]: Stopping network-cleanup.service...
Feb  9 19:26:46.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.953877 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Feb  9 19:26:46.954088 systemd[1]: Stopped parse-ip-for-networkd.service.
Feb  9 19:26:46.958481 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Feb  9 19:26:46.958666 systemd[1]: Stopped systemd-sysctl.service.
Feb  9 19:26:46.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.965275 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Feb  9 19:26:46.965335 systemd[1]: Stopped systemd-modules-load.service.
Feb  9 19:26:46.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.974385 systemd[1]: Stopping systemd-udevd.service...
Feb  9 19:26:46.976432 systemd[1]: systemd-resolved.service: Deactivated successfully.
Feb  9 19:26:46.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.976541 systemd[1]: Stopped systemd-resolved.service.
Feb  9 19:26:46.983341 systemd[1]: systemd-udevd.service: Deactivated successfully.
Feb  9 19:26:46.984510 systemd[1]: Stopped systemd-udevd.service.
Feb  9 19:26:46.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.988058 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Feb  9 19:26:46.988000 audit: BPF prog-id=6 op=UNLOAD
Feb  9 19:26:46.988128 systemd[1]: Closed systemd-udevd-control.socket.
Feb  9 19:26:46.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.990123 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Feb  9 19:26:46.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.990198 systemd[1]: Closed systemd-udevd-kernel.socket.
Feb  9 19:26:47.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:47.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:46.991401 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Feb  9 19:26:46.992641 systemd[1]: Stopped dracut-pre-udev.service.
Feb  9 19:26:46.994014 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Feb  9 19:26:46.994059 systemd[1]: Stopped dracut-cmdline.service.
Feb  9 19:26:46.996124 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Feb  9 19:26:46.996164 systemd[1]: Stopped dracut-cmdline-ask.service.
Feb  9 19:26:46.999214 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Feb  9 19:26:47.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:47.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:47.000756 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Feb  9 19:26:47.000817 systemd[1]: Stopped systemd-vconsole-setup.service.
Feb  9 19:26:47.002662 systemd[1]: network-cleanup.service: Deactivated successfully.
Feb  9 19:26:47.002772 systemd[1]: Stopped network-cleanup.service.
Feb  9 19:26:47.012041 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Feb  9 19:26:47.012171 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Feb  9 19:26:47.343511 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Feb  9 19:26:47.566676 systemd[1]: sysroot-boot.service: Deactivated successfully.
Feb  9 19:26:47.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:47.566832 systemd[1]: Stopped sysroot-boot.service.
Feb  9 19:26:47.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:26:47.567149 systemd[1]: Reached target initrd-switch-root.target.
Feb  9 19:26:47.570431 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Feb  9 19:26:47.570500 systemd[1]: Stopped initrd-setup-root.service.
Feb  9 19:26:47.572992 systemd[1]: Starting initrd-switch-root.service...
Feb  9 19:26:47.596070 systemd[1]: Switching root.
Feb  9 19:26:47.623578 iscsid[1029]: iscsid shutting down.
Feb  9 19:26:47.625060 systemd-journald[185]: Received SIGTERM from PID 1 (n/a).
Feb  9 19:26:47.625141 systemd-journald[185]: Journal stopped
Feb  9 19:27:02.465305 kernel: SELinux:  Class mctp_socket not defined in policy.
Feb  9 19:27:02.465396 kernel: SELinux:  Class anon_inode not defined in policy.
Feb  9 19:27:02.465420 kernel: SELinux: the above unknown classes and permissions will be allowed
Feb  9 19:27:02.465439 kernel: SELinux:  policy capability network_peer_controls=1
Feb  9 19:27:02.465458 kernel: SELinux:  policy capability open_perms=1
Feb  9 19:27:02.465476 kernel: SELinux:  policy capability extended_socket_class=1
Feb  9 19:27:02.465507 kernel: SELinux:  policy capability always_check_network=0
Feb  9 19:27:02.465525 kernel: SELinux:  policy capability cgroup_seclabel=1
Feb  9 19:27:02.465542 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Feb  9 19:27:02.465559 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Feb  9 19:27:02.466365 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Feb  9 19:27:02.466401 systemd[1]: Successfully loaded SELinux policy in 246.925ms.
Feb  9 19:27:02.466435 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.424ms.
Feb  9 19:27:02.466457 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Feb  9 19:27:02.466482 systemd[1]: Detected virtualization amazon.
Feb  9 19:27:02.466501 systemd[1]: Detected architecture x86-64.
Feb  9 19:27:02.466521 systemd[1]: Detected first boot.
Feb  9 19:27:02.466544 systemd[1]: Initializing machine ID from VM UUID.
Feb  9 19:27:02.466563 kernel: SELinux:  Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped).
Feb  9 19:27:02.466581 kernel: kauditd_printk_skb: 38 callbacks suppressed
Feb  9 19:27:02.466600 kernel: audit: type=1400 audit(1707506812.121:84): avc:  denied  { associate } for  pid=1252 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Feb  9 19:27:02.466623 kernel: audit: type=1300 audit(1707506812.121:84): arch=c000003e syscall=188 success=yes exit=0 a0=c0001058e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=1235 pid=1252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:02.466641 kernel: audit: type=1327 audit(1707506812.121:84): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 19:27:02.466660 kernel: audit: type=1400 audit(1707506812.124:85): avc:  denied  { associate } for  pid=1252 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Feb  9 19:27:02.466679 kernel: audit: type=1300 audit(1707506812.124:85): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059b9 a2=1ed a3=0 items=2 ppid=1235 pid=1252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:02.467016 kernel: audit: type=1307 audit(1707506812.124:85): cwd="/"
Feb  9 19:27:02.467037 kernel: audit: type=1302 audit(1707506812.124:85): item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:02.467056 kernel: audit: type=1302 audit(1707506812.124:85): item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:02.467078 kernel: audit: type=1327 audit(1707506812.124:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 19:27:02.467096 systemd[1]: Populated /etc with preset unit settings.
Feb  9 19:27:02.467115 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 19:27:02.467134 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 19:27:02.467152 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 19:27:02.467170 kernel: audit: type=1334 audit(1707506821.755:86): prog-id=12 op=LOAD
Feb  9 19:27:02.467189 kernel: audit: type=1334 audit(1707506821.755:87): prog-id=3 op=UNLOAD
Feb  9 19:27:02.467205 kernel: audit: type=1334 audit(1707506821.757:88): prog-id=13 op=LOAD
Feb  9 19:27:02.470944 kernel: audit: type=1334 audit(1707506821.760:89): prog-id=14 op=LOAD
Feb  9 19:27:02.471010 kernel: audit: type=1334 audit(1707506821.760:90): prog-id=4 op=UNLOAD
Feb  9 19:27:02.471030 kernel: audit: type=1334 audit(1707506821.760:91): prog-id=5 op=UNLOAD
Feb  9 19:27:02.471048 kernel: audit: type=1334 audit(1707506821.764:92): prog-id=15 op=LOAD
Feb  9 19:27:02.471071 kernel: audit: type=1334 audit(1707506821.764:93): prog-id=12 op=UNLOAD
Feb  9 19:27:02.471087 kernel: audit: type=1334 audit(1707506821.765:94): prog-id=16 op=LOAD
Feb  9 19:27:02.471108 kernel: audit: type=1334 audit(1707506821.767:95): prog-id=17 op=LOAD
Feb  9 19:27:02.471129 systemd[1]: iscsid.service: Deactivated successfully.
Feb  9 19:27:02.471152 systemd[1]: Stopped iscsid.service.
Feb  9 19:27:02.471174 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Feb  9 19:27:02.471192 systemd[1]: Stopped initrd-switch-root.service.
Feb  9 19:27:02.471212 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Feb  9 19:27:02.471233 systemd[1]: Created slice system-addon\x2dconfig.slice.
Feb  9 19:27:02.471252 systemd[1]: Created slice system-addon\x2drun.slice.
Feb  9 19:27:02.471277 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice.
Feb  9 19:27:02.471297 systemd[1]: Created slice system-getty.slice.
Feb  9 19:27:02.471326 systemd[1]: Created slice system-modprobe.slice.
Feb  9 19:27:02.471350 systemd[1]: Created slice system-serial\x2dgetty.slice.
Feb  9 19:27:02.471368 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Feb  9 19:27:02.471390 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Feb  9 19:27:02.471409 systemd[1]: Created slice user.slice.
Feb  9 19:27:02.471427 systemd[1]: Started systemd-ask-password-console.path.
Feb  9 19:27:02.471446 systemd[1]: Started systemd-ask-password-wall.path.
Feb  9 19:27:02.471465 systemd[1]: Set up automount boot.automount.
Feb  9 19:27:02.471485 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Feb  9 19:27:02.471505 systemd[1]: Stopped target initrd-switch-root.target.
Feb  9 19:27:02.471524 systemd[1]: Stopped target initrd-fs.target.
Feb  9 19:27:02.471543 systemd[1]: Stopped target initrd-root-fs.target.
Feb  9 19:27:02.471565 systemd[1]: Reached target integritysetup.target.
Feb  9 19:27:02.471585 systemd[1]: Reached target remote-cryptsetup.target.
Feb  9 19:27:02.471604 systemd[1]: Reached target remote-fs.target.
Feb  9 19:27:02.471623 systemd[1]: Reached target slices.target.
Feb  9 19:27:02.471642 systemd[1]: Reached target swap.target.
Feb  9 19:27:02.471661 systemd[1]: Reached target torcx.target.
Feb  9 19:27:02.471694 systemd[1]: Reached target veritysetup.target.
Feb  9 19:27:02.471721 systemd[1]: Listening on systemd-coredump.socket.
Feb  9 19:27:02.471739 systemd[1]: Listening on systemd-initctl.socket.
Feb  9 19:27:02.471757 systemd[1]: Listening on systemd-networkd.socket.
Feb  9 19:27:02.471780 systemd[1]: Listening on systemd-udevd-control.socket.
Feb  9 19:27:02.471798 systemd[1]: Listening on systemd-udevd-kernel.socket.
Feb  9 19:27:02.471817 systemd[1]: Listening on systemd-userdbd.socket.
Feb  9 19:27:02.471836 systemd[1]: Mounting dev-hugepages.mount...
Feb  9 19:27:02.471855 systemd[1]: Mounting dev-mqueue.mount...
Feb  9 19:27:02.471874 systemd[1]: Mounting media.mount...
Feb  9 19:27:02.471893 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Feb  9 19:27:02.471913 systemd[1]: Mounting sys-kernel-debug.mount...
Feb  9 19:27:02.471934 systemd[1]: Mounting sys-kernel-tracing.mount...
Feb  9 19:27:02.471955 systemd[1]: Mounting tmp.mount...
Feb  9 19:27:02.471974 systemd[1]: Starting flatcar-tmpfiles.service...
Feb  9 19:27:02.471993 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Feb  9 19:27:02.472012 systemd[1]: Starting kmod-static-nodes.service...
Feb  9 19:27:02.472031 systemd[1]: Starting modprobe@configfs.service...
Feb  9 19:27:02.472049 systemd[1]: Starting modprobe@dm_mod.service...
Feb  9 19:27:02.472068 systemd[1]: Starting modprobe@drm.service...
Feb  9 19:27:02.472087 systemd[1]: Starting modprobe@efi_pstore.service...
Feb  9 19:27:02.472105 systemd[1]: Starting modprobe@fuse.service...
Feb  9 19:27:02.472127 systemd[1]: Starting modprobe@loop.service...
Feb  9 19:27:02.472147 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Feb  9 19:27:02.472165 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Feb  9 19:27:02.472184 systemd[1]: Stopped systemd-fsck-root.service.
Feb  9 19:27:02.472202 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Feb  9 19:27:02.472221 systemd[1]: Stopped systemd-fsck-usr.service.
Feb  9 19:27:02.472240 systemd[1]: Stopped systemd-journald.service.
Feb  9 19:27:02.472259 systemd[1]: Starting systemd-journald.service...
Feb  9 19:27:02.472278 systemd[1]: Starting systemd-modules-load.service...
Feb  9 19:27:02.472301 systemd[1]: Starting systemd-network-generator.service...
Feb  9 19:27:02.472320 systemd[1]: Starting systemd-remount-fs.service...
Feb  9 19:27:02.472338 systemd[1]: Starting systemd-udev-trigger.service...
Feb  9 19:27:02.472358 systemd[1]: verity-setup.service: Deactivated successfully.
Feb  9 19:27:02.472378 systemd[1]: Stopped verity-setup.service.
Feb  9 19:27:02.472397 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Feb  9 19:27:02.472418 systemd[1]: Mounted dev-hugepages.mount.
Feb  9 19:27:02.472437 systemd[1]: Mounted dev-mqueue.mount.
Feb  9 19:27:02.472457 systemd[1]: Mounted media.mount.
Feb  9 19:27:02.472479 systemd[1]: Mounted sys-kernel-debug.mount.
Feb  9 19:27:02.472497 kernel: loop: module loaded
Feb  9 19:27:02.472515 systemd[1]: Mounted sys-kernel-tracing.mount.
Feb  9 19:27:02.472534 systemd[1]: Mounted tmp.mount.
Feb  9 19:27:02.472552 systemd[1]: Finished kmod-static-nodes.service.
Feb  9 19:27:02.472572 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Feb  9 19:27:02.472590 systemd[1]: Finished modprobe@configfs.service.
Feb  9 19:27:02.472609 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Feb  9 19:27:02.472631 systemd[1]: Finished modprobe@dm_mod.service.
Feb  9 19:27:02.472650 systemd[1]: modprobe@drm.service: Deactivated successfully.
Feb  9 19:27:02.472671 systemd[1]: Finished modprobe@drm.service.
Feb  9 19:27:02.472700 kernel: fuse: init (API version 7.34)
Feb  9 19:27:02.472719 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Feb  9 19:27:02.472739 systemd[1]: Finished modprobe@efi_pstore.service.
Feb  9 19:27:02.472756 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Feb  9 19:27:02.472774 systemd[1]: Finished modprobe@fuse.service.
Feb  9 19:27:02.472793 systemd[1]: modprobe@loop.service: Deactivated successfully.
Feb  9 19:27:02.473017 systemd[1]: Finished modprobe@loop.service.
Feb  9 19:27:02.473044 systemd[1]: Finished systemd-modules-load.service.
Feb  9 19:27:02.473068 systemd[1]: Finished systemd-network-generator.service.
Feb  9 19:27:02.484008 systemd[1]: Finished systemd-remount-fs.service.
Feb  9 19:27:02.484068 systemd-journald[1325]: Journal started
Feb  9 19:27:02.484161 systemd-journald[1325]: Runtime Journal (/run/log/journal/ec28f6389bbcdf530598d30edf29e949) is 4.8M, max 38.7M, 33.9M free.
Feb  9 19:26:50.706000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Feb  9 19:26:51.168000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Feb  9 19:26:51.168000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Feb  9 19:26:51.168000 audit: BPF prog-id=10 op=LOAD
Feb  9 19:26:51.168000 audit: BPF prog-id=10 op=UNLOAD
Feb  9 19:26:51.168000 audit: BPF prog-id=11 op=LOAD
Feb  9 19:26:51.168000 audit: BPF prog-id=11 op=UNLOAD
Feb  9 19:26:52.121000 audit[1252]: AVC avc:  denied  { associate } for  pid=1252 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Feb  9 19:26:52.121000 audit[1252]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=1235 pid=1252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:26:52.121000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 19:26:52.124000 audit[1252]: AVC avc:  denied  { associate } for  pid=1252 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Feb  9 19:26:52.124000 audit[1252]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059b9 a2=1ed a3=0 items=2 ppid=1235 pid=1252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:26:52.124000 audit: CWD cwd="/"
Feb  9 19:26:52.124000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:26:52.124000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:26:52.124000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 19:27:01.755000 audit: BPF prog-id=12 op=LOAD
Feb  9 19:27:01.755000 audit: BPF prog-id=3 op=UNLOAD
Feb  9 19:27:01.757000 audit: BPF prog-id=13 op=LOAD
Feb  9 19:27:01.760000 audit: BPF prog-id=14 op=LOAD
Feb  9 19:27:01.760000 audit: BPF prog-id=4 op=UNLOAD
Feb  9 19:27:01.760000 audit: BPF prog-id=5 op=UNLOAD
Feb  9 19:27:01.764000 audit: BPF prog-id=15 op=LOAD
Feb  9 19:27:01.764000 audit: BPF prog-id=12 op=UNLOAD
Feb  9 19:27:01.765000 audit: BPF prog-id=16 op=LOAD
Feb  9 19:27:01.767000 audit: BPF prog-id=17 op=LOAD
Feb  9 19:27:01.767000 audit: BPF prog-id=13 op=UNLOAD
Feb  9 19:27:01.767000 audit: BPF prog-id=14 op=UNLOAD
Feb  9 19:27:01.769000 audit: BPF prog-id=18 op=LOAD
Feb  9 19:27:01.769000 audit: BPF prog-id=15 op=UNLOAD
Feb  9 19:27:01.772000 audit: BPF prog-id=19 op=LOAD
Feb  9 19:27:01.774000 audit: BPF prog-id=20 op=LOAD
Feb  9 19:27:01.774000 audit: BPF prog-id=16 op=UNLOAD
Feb  9 19:27:01.774000 audit: BPF prog-id=17 op=UNLOAD
Feb  9 19:27:01.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:01.779000 audit: BPF prog-id=18 op=UNLOAD
Feb  9 19:27:01.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:01.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:01.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.485703 systemd[1]: Started systemd-journald.service.
Feb  9 19:27:02.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.175000 audit: BPF prog-id=21 op=LOAD
Feb  9 19:27:02.175000 audit: BPF prog-id=22 op=LOAD
Feb  9 19:27:02.175000 audit: BPF prog-id=23 op=LOAD
Feb  9 19:27:02.175000 audit: BPF prog-id=19 op=UNLOAD
Feb  9 19:27:02.175000 audit: BPF prog-id=20 op=UNLOAD
Feb  9 19:27:02.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.458000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Feb  9 19:27:02.458000 audit[1325]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe8bb70110 a2=4000 a3=7ffe8bb701ac items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:02.458000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Feb  9 19:27:02.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:01.755153 systemd[1]: Queued start job for default target multi-user.target.
Feb  9 19:26:52.120386 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 19:27:01.776353 systemd[1]: systemd-journald.service: Deactivated successfully.
Feb  9 19:26:52.121115 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Feb  9 19:27:02.496603 systemd[1]: Reached target network-pre.target.
Feb  9 19:26:52.121134 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Feb  9 19:26:52.121260 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Feb  9 19:27:02.506199 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Feb  9 19:26:52.121272 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="skipped missing lower profile" missing profile=oem
Feb  9 19:27:02.510072 systemd[1]: Mounting sys-kernel-config.mount...
Feb  9 19:26:52.121356 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Feb  9 19:26:52.121370 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Feb  9 19:26:52.121563 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Feb  9 19:27:02.522433 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Feb  9 19:26:52.121603 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Feb  9 19:26:52.121616 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Feb  9 19:26:52.122440 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Feb  9 19:26:52.122478 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Feb  9 19:26:52.122498 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2
Feb  9 19:26:52.122513 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Feb  9 19:26:52.122530 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2
Feb  9 19:26:52.122544 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:26:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Feb  9 19:27:00.462943 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:27:00Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 19:27:00.463352 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:27:00Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 19:27:00.463623 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:27:00Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 19:27:00.464017 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:27:00Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 19:27:00.464086 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:27:00Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Feb  9 19:27:00.464147 /usr/lib/systemd/system-generators/torcx-generator[1252]: time="2024-02-09T19:27:00Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Feb  9 19:27:02.528294 systemd[1]: Starting systemd-hwdb-update.service...
Feb  9 19:27:02.533390 systemd[1]: Starting systemd-journal-flush.service...
Feb  9 19:27:02.538086 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Feb  9 19:27:02.544513 systemd[1]: Starting systemd-random-seed.service...
Feb  9 19:27:02.545914 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Feb  9 19:27:02.548783 systemd[1]: Starting systemd-sysctl.service...
Feb  9 19:27:02.560108 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Feb  9 19:27:02.565286 systemd[1]: Mounted sys-kernel-config.mount.
Feb  9 19:27:02.625899 systemd[1]: Finished systemd-random-seed.service.
Feb  9 19:27:02.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.627891 systemd[1]: Reached target first-boot-complete.target.
Feb  9 19:27:02.655964 systemd[1]: Finished systemd-sysctl.service.
Feb  9 19:27:02.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.670477 systemd-journald[1325]: Time spent on flushing to /var/log/journal/ec28f6389bbcdf530598d30edf29e949 is 138.209ms for 1246 entries.
Feb  9 19:27:02.670477 systemd-journald[1325]: System Journal (/var/log/journal/ec28f6389bbcdf530598d30edf29e949) is 8.0M, max 195.6M, 187.6M free.
Feb  9 19:27:02.855639 systemd-journald[1325]: Received client request to flush runtime journal.
Feb  9 19:27:02.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:02.777191 systemd[1]: Finished flatcar-tmpfiles.service.
Feb  9 19:27:02.780525 systemd[1]: Starting systemd-sysusers.service...
Feb  9 19:27:02.820200 systemd[1]: Finished systemd-udev-trigger.service.
Feb  9 19:27:02.860222 udevadm[1368]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in.
Feb  9 19:27:02.828769 systemd[1]: Starting systemd-udev-settle.service...
Feb  9 19:27:02.857259 systemd[1]: Finished systemd-journal-flush.service.
Feb  9 19:27:03.907345 systemd[1]: Finished systemd-sysusers.service.
Feb  9 19:27:03.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:04.398952 systemd[1]: Finished systemd-hwdb-update.service.
Feb  9 19:27:04.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:04.399000 audit: BPF prog-id=24 op=LOAD
Feb  9 19:27:04.399000 audit: BPF prog-id=25 op=LOAD
Feb  9 19:27:04.399000 audit: BPF prog-id=7 op=UNLOAD
Feb  9 19:27:04.399000 audit: BPF prog-id=8 op=UNLOAD
Feb  9 19:27:04.402590 systemd[1]: Starting systemd-udevd.service...
Feb  9 19:27:04.433410 systemd-udevd[1370]: Using default interface naming scheme 'v252'.
Feb  9 19:27:04.479311 systemd[1]: Started systemd-udevd.service.
Feb  9 19:27:04.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:04.480000 audit: BPF prog-id=26 op=LOAD
Feb  9 19:27:04.483481 systemd[1]: Starting systemd-networkd.service...
Feb  9 19:27:04.499000 audit: BPF prog-id=27 op=LOAD
Feb  9 19:27:04.499000 audit: BPF prog-id=28 op=LOAD
Feb  9 19:27:04.499000 audit: BPF prog-id=29 op=LOAD
Feb  9 19:27:04.503049 systemd[1]: Starting systemd-userdbd.service...
Feb  9 19:27:04.567434 systemd[1]: Started systemd-userdbd.service.
Feb  9 19:27:04.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:04.589089 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped.
Feb  9 19:27:04.691380 (udev-worker)[1384]: Network interface NamePolicy= disabled on kernel command line.
Feb  9 19:27:04.742525 systemd-networkd[1376]: lo: Link UP
Feb  9 19:27:04.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:04.742540 systemd-networkd[1376]: lo: Gained carrier
Feb  9 19:27:04.743141 systemd-networkd[1376]: Enumeration completed
Feb  9 19:27:04.743356 systemd[1]: Started systemd-networkd.service.
Feb  9 19:27:04.743842 systemd-networkd[1376]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Feb  9 19:27:04.746247 systemd[1]: Starting systemd-networkd-wait-online.service...
Feb  9 19:27:04.751745 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 19:27:04.753204 systemd-networkd[1376]: eth0: Link UP
Feb  9 19:27:04.753382 systemd-networkd[1376]: eth0: Gained carrier
Feb  9 19:27:04.766898 systemd-networkd[1376]: eth0: DHCPv4 address 172.31.21.113/20, gateway 172.31.16.1 acquired from 172.31.16.1
Feb  9 19:27:04.837705 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2
Feb  9 19:27:04.831000 audit[1375]: AVC avc:  denied  { confidentiality } for  pid=1375 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Feb  9 19:27:04.831000 audit[1375]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564ee9506be0 a1=32194 a2=7f598beebbc5 a3=5 items=108 ppid=1370 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:04.831000 audit: CWD cwd="/"
Feb  9 19:27:04.831000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=1 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=2 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=3 name=(null) inode=14722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=4 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=5 name=(null) inode=14723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=6 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=7 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=8 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=9 name=(null) inode=14725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=10 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=11 name=(null) inode=14726 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=12 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=13 name=(null) inode=14727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=14 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=15 name=(null) inode=14728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=16 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=17 name=(null) inode=14729 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=18 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=19 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=20 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=21 name=(null) inode=14731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=22 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=23 name=(null) inode=14732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=24 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=25 name=(null) inode=14733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=26 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=27 name=(null) inode=14734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=28 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=29 name=(null) inode=14735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=30 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=31 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=32 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=33 name=(null) inode=14737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=34 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=35 name=(null) inode=14738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=36 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=37 name=(null) inode=14739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=38 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=39 name=(null) inode=14740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=40 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=41 name=(null) inode=14741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=42 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=43 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=44 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=45 name=(null) inode=14743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=46 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=47 name=(null) inode=14744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=48 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=49 name=(null) inode=14745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=50 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=51 name=(null) inode=14746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=52 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=53 name=(null) inode=14747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=55 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=56 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=57 name=(null) inode=14749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=58 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=59 name=(null) inode=14750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=60 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=61 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=62 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=63 name=(null) inode=14752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=64 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=65 name=(null) inode=14753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=66 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=67 name=(null) inode=14754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=68 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=69 name=(null) inode=14755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=70 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=71 name=(null) inode=14756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=72 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=73 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=74 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=75 name=(null) inode=14758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=76 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=77 name=(null) inode=14759 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=78 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=79 name=(null) inode=14760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=80 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=81 name=(null) inode=14761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=82 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=83 name=(null) inode=14762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=84 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=85 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=86 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=87 name=(null) inode=14764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=88 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=89 name=(null) inode=14765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=90 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=91 name=(null) inode=14766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=92 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=93 name=(null) inode=14767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=94 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=95 name=(null) inode=14768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=96 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=97 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=98 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=99 name=(null) inode=14770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=100 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=101 name=(null) inode=14771 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=102 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=103 name=(null) inode=14772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=104 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=105 name=(null) inode=14773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=106 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PATH item=107 name=(null) inode=14774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:27:04.831000 audit: PROCTITLE proctitle="(udev-worker)"
Feb  9 19:27:04.860333 kernel: ACPI: button: Power Button [PWRF]
Feb  9 19:27:04.860410 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3
Feb  9 19:27:04.860464 kernel: ACPI: button: Sleep Button [SLPF]
Feb  9 19:27:04.869724 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255
Feb  9 19:27:04.880718 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4
Feb  9 19:27:04.884856 kernel: mousedev: PS/2 mouse device common for all mice
Feb  9 19:27:05.089720 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1373)
Feb  9 19:27:05.207083 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Feb  9 19:27:05.209333 systemd[1]: Finished systemd-udev-settle.service.
Feb  9 19:27:05.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:05.212060 systemd[1]: Starting lvm2-activation-early.service...
Feb  9 19:27:05.471221 lvm[1484]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Feb  9 19:27:05.504071 systemd[1]: Finished lvm2-activation-early.service.
Feb  9 19:27:05.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:05.505668 systemd[1]: Reached target cryptsetup.target.
Feb  9 19:27:05.508846 systemd[1]: Starting lvm2-activation.service...
Feb  9 19:27:05.516907 lvm[1485]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Feb  9 19:27:05.548660 systemd[1]: Finished lvm2-activation.service.
Feb  9 19:27:05.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:05.550119 systemd[1]: Reached target local-fs-pre.target.
Feb  9 19:27:05.551574 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Feb  9 19:27:05.551629 systemd[1]: Reached target local-fs.target.
Feb  9 19:27:05.553136 systemd[1]: Reached target machines.target.
Feb  9 19:27:05.556436 systemd[1]: Starting ldconfig.service...
Feb  9 19:27:05.558075 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Feb  9 19:27:05.558160 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 19:27:05.560112 systemd[1]: Starting systemd-boot-update.service...
Feb  9 19:27:05.564178 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Feb  9 19:27:05.570953 systemd[1]: Starting systemd-machine-id-commit.service...
Feb  9 19:27:05.572237 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Feb  9 19:27:05.572409 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Feb  9 19:27:05.574145 systemd[1]: Starting systemd-tmpfiles-setup.service...
Feb  9 19:27:05.602606 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1487 (bootctl)
Feb  9 19:27:05.608485 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Feb  9 19:27:05.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:05.642597 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Feb  9 19:27:05.650901 systemd-tmpfiles[1490]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Feb  9 19:27:05.727593 systemd-tmpfiles[1490]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Feb  9 19:27:05.753391 systemd-tmpfiles[1490]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Feb  9 19:27:06.043137 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Feb  9 19:27:06.044004 systemd[1]: Finished systemd-machine-id-commit.service.
Feb  9 19:27:06.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.083202 systemd-fsck[1495]: fsck.fat 4.2 (2021-01-31)
Feb  9 19:27:06.083202 systemd-fsck[1495]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters
Feb  9 19:27:06.089372 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Feb  9 19:27:06.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.095902 systemd[1]: Mounting boot.mount...
Feb  9 19:27:06.117135 systemd[1]: Mounted boot.mount.
Feb  9 19:27:06.163460 systemd[1]: Finished systemd-boot-update.service.
Feb  9 19:27:06.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.268739 systemd[1]: Finished systemd-tmpfiles-setup.service.
Feb  9 19:27:06.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.272701 systemd[1]: Starting audit-rules.service...
Feb  9 19:27:06.277558 systemd[1]: Starting clean-ca-certificates.service...
Feb  9 19:27:06.284000 audit: BPF prog-id=30 op=LOAD
Feb  9 19:27:06.291000 audit: BPF prog-id=31 op=LOAD
Feb  9 19:27:06.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.283122 systemd[1]: Starting systemd-journal-catalog-update.service...
Feb  9 19:27:06.288357 systemd[1]: Starting systemd-resolved.service...
Feb  9 19:27:06.291334 systemd-networkd[1376]: eth0: Gained IPv6LL
Feb  9 19:27:06.294460 systemd[1]: Starting systemd-timesyncd.service...
Feb  9 19:27:06.298826 systemd[1]: Starting systemd-update-utmp.service...
Feb  9 19:27:06.301895 systemd[1]: Finished systemd-networkd-wait-online.service.
Feb  9 19:27:06.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.320309 systemd[1]: Finished clean-ca-certificates.service.
Feb  9 19:27:06.323014 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Feb  9 19:27:06.323000 audit[1515]: SYSTEM_BOOT pid=1515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.331408 systemd[1]: Finished systemd-update-utmp.service.
Feb  9 19:27:06.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.417066 systemd[1]: Finished systemd-journal-catalog-update.service.
Feb  9 19:27:06.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.459341 systemd[1]: Started systemd-timesyncd.service.
Feb  9 19:27:06.461039 systemd[1]: Reached target time-set.target.
Feb  9 19:27:06.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.508606 systemd-timesyncd[1514]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org).
Feb  9 19:27:06.508939 systemd-timesyncd[1514]: Initial clock synchronization to Fri 2024-02-09 19:27:06.433088 UTC.
Feb  9 19:27:06.598373 systemd-resolved[1513]: Positive Trust Anchors:
Feb  9 19:27:06.598395 systemd-resolved[1513]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Feb  9 19:27:06.598438 systemd-resolved[1513]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Feb  9 19:27:06.726407 systemd-resolved[1513]: Defaulting to hostname 'linux'.
Feb  9 19:27:06.729798 systemd[1]: Started systemd-resolved.service.
Feb  9 19:27:06.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:06.731337 systemd[1]: Reached target network.target.
Feb  9 19:27:06.732505 systemd[1]: Reached target network-online.target.
Feb  9 19:27:06.733723 systemd[1]: Reached target nss-lookup.target.
Feb  9 19:27:06.753000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Feb  9 19:27:06.753000 audit[1530]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb2fd3910 a2=420 a3=0 items=0 ppid=1509 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:06.753000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Feb  9 19:27:06.755321 augenrules[1530]: No rules
Feb  9 19:27:06.756664 systemd[1]: Finished audit-rules.service.
Feb  9 19:27:09.949081 ldconfig[1486]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Feb  9 19:27:10.031429 systemd[1]: Finished ldconfig.service.
Feb  9 19:27:10.034536 systemd[1]: Starting systemd-update-done.service...
Feb  9 19:27:10.046318 systemd[1]: Finished systemd-update-done.service.
Feb  9 19:27:10.049346 systemd[1]: Reached target sysinit.target.
Feb  9 19:27:10.052024 systemd[1]: Started motdgen.path.
Feb  9 19:27:10.054862 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Feb  9 19:27:10.057762 systemd[1]: Started logrotate.timer.
Feb  9 19:27:10.060603 systemd[1]: Started mdadm.timer.
Feb  9 19:27:10.064488 systemd[1]: Started systemd-tmpfiles-clean.timer.
Feb  9 19:27:10.065700 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Feb  9 19:27:10.065734 systemd[1]: Reached target paths.target.
Feb  9 19:27:10.067061 systemd[1]: Reached target timers.target.
Feb  9 19:27:10.068816 systemd[1]: Listening on dbus.socket.
Feb  9 19:27:10.072072 systemd[1]: Starting docker.socket...
Feb  9 19:27:10.078622 systemd[1]: Listening on sshd.socket.
Feb  9 19:27:10.080714 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 19:27:10.081559 systemd[1]: Listening on docker.socket.
Feb  9 19:27:10.083194 systemd[1]: Reached target sockets.target.
Feb  9 19:27:10.087529 systemd[1]: Reached target basic.target.
Feb  9 19:27:10.090351 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Feb  9 19:27:10.090378 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Feb  9 19:27:10.092446 systemd[1]: Started amazon-ssm-agent.service.
Feb  9 19:27:10.098358 systemd[1]: Starting containerd.service...
Feb  9 19:27:10.102041 systemd[1]: Starting coreos-metadata-sshkeys@core.service...
Feb  9 19:27:10.107546 systemd[1]: Starting dbus.service...
Feb  9 19:27:10.110905 systemd[1]: Starting enable-oem-cloudinit.service...
Feb  9 19:27:10.116672 systemd[1]: Starting extend-filesystems.service...
Feb  9 19:27:10.117825 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Feb  9 19:27:10.119592 systemd[1]: Starting motdgen.service...
Feb  9 19:27:10.124236 systemd[1]: Started nvidia.service.
Feb  9 19:27:10.128134 systemd[1]: Starting prepare-cni-plugins.service...
Feb  9 19:27:10.131819 systemd[1]: Starting prepare-critools.service...
Feb  9 19:27:10.136456 systemd[1]: Starting prepare-helm.service...
Feb  9 19:27:10.143074 systemd[1]: Starting ssh-key-proc-cmdline.service...
Feb  9 19:27:10.147371 systemd[1]: Starting sshd-keygen.service...
Feb  9 19:27:10.159325 systemd[1]: Starting systemd-logind.service...
Feb  9 19:27:10.164809 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 19:27:10.164893 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Feb  9 19:27:10.166633 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Feb  9 19:27:10.168644 systemd[1]: Starting update-engine.service...
Feb  9 19:27:10.172088 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Feb  9 19:27:10.189486 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Feb  9 19:27:10.189793 systemd[1]: Finished ssh-key-proc-cmdline.service.
Feb  9 19:27:10.212733 jq[1542]: false
Feb  9 19:27:10.213090 jq[1558]: true
Feb  9 19:27:10.200497 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Feb  9 19:27:10.200818 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Feb  9 19:27:10.247794 extend-filesystems[1543]: Found nvme0n1
Feb  9 19:27:10.247794 extend-filesystems[1543]: Found nvme0n1p1
Feb  9 19:27:10.247794 extend-filesystems[1543]: Found nvme0n1p2
Feb  9 19:27:10.247794 extend-filesystems[1543]: Found nvme0n1p3
Feb  9 19:27:10.247794 extend-filesystems[1543]: Found usr
Feb  9 19:27:10.247794 extend-filesystems[1543]: Found nvme0n1p4
Feb  9 19:27:10.247794 extend-filesystems[1543]: Found nvme0n1p6
Feb  9 19:27:10.247794 extend-filesystems[1543]: Found nvme0n1p7
Feb  9 19:27:10.259001 extend-filesystems[1543]: Found nvme0n1p9
Feb  9 19:27:10.259001 extend-filesystems[1543]: Checking size of /dev/nvme0n1p9
Feb  9 19:27:10.287822 jq[1563]: true
Feb  9 19:27:10.318490 tar[1560]: ./
Feb  9 19:27:10.318490 tar[1560]: ./macvlan
Feb  9 19:27:10.321704 tar[1562]: linux-amd64/helm
Feb  9 19:27:10.322507 tar[1561]: crictl
Feb  9 19:27:10.377380 dbus-daemon[1541]: [system] SELinux support is enabled
Feb  9 19:27:10.379558 dbus-daemon[1541]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1376 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0")
Feb  9 19:27:10.377643 systemd[1]: Started dbus.service.
Feb  9 19:27:10.391164 dbus-daemon[1541]: [system] Successfully activated service 'org.freedesktop.systemd1'
Feb  9 19:27:10.382381 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Feb  9 19:27:10.382420 systemd[1]: Reached target system-config.target.
Feb  9 19:27:10.388328 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Feb  9 19:27:10.388362 systemd[1]: Reached target user-config.target.
Feb  9 19:27:10.399182 systemd[1]: Starting systemd-hostnamed.service...
Feb  9 19:27:10.486900 systemd[1]: motdgen.service: Deactivated successfully.
Feb  9 19:27:10.487142 systemd[1]: Finished motdgen.service.
Feb  9 19:27:10.506139 extend-filesystems[1543]: Resized partition /dev/nvme0n1p9
Feb  9 19:27:10.551952 extend-filesystems[1597]: resize2fs 1.46.5 (30-Dec-2021)
Feb  9 19:27:10.612617 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks
Feb  9 19:27:10.709711 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915
Feb  9 19:27:10.895243 extend-filesystems[1597]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required
Feb  9 19:27:10.895243 extend-filesystems[1597]: old_desc_blocks = 1, new_desc_blocks = 1
Feb  9 19:27:10.895243 extend-filesystems[1597]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long.
Feb  9 19:27:10.908566 amazon-ssm-agent[1538]: 2024/02/09 19:27:10 Failed to load instance info from vault. RegistrationKey does not exist.
Feb  9 19:27:10.815330 systemd[1]: extend-filesystems.service: Deactivated successfully.
Feb  9 19:27:10.903625 dbus-daemon[1541]: [system] Successfully activated service 'org.freedesktop.hostname1'
Feb  9 19:27:10.924406 extend-filesystems[1543]: Resized filesystem in /dev/nvme0n1p9
Feb  9 19:27:10.925870 bash[1613]: Updated "/home/core/.ssh/authorized_keys"
Feb  9 19:27:10.815716 systemd[1]: Finished extend-filesystems.service.
Feb  9 19:27:10.904208 dbus-daemon[1541]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1588 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0")
Feb  9 19:27:10.820018 systemd-logind[1552]: Watching system buttons on /dev/input/event1 (Power Button)
Feb  9 19:27:10.820042 systemd-logind[1552]: Watching system buttons on /dev/input/event2 (Sleep Button)
Feb  9 19:27:10.935981 env[1569]: time="2024-02-09T19:27:10.927702423Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Feb  9 19:27:10.820067 systemd-logind[1552]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Feb  9 19:27:10.820859 systemd-logind[1552]: New seat seat0.
Feb  9 19:27:10.827566 systemd[1]: Started systemd-logind.service.
Feb  9 19:27:10.854794 systemd[1]: nvidia.service: Deactivated successfully.
Feb  9 19:27:10.903838 systemd[1]: Started systemd-hostnamed.service.
Feb  9 19:27:10.911901 systemd[1]: Starting polkit.service...
Feb  9 19:27:10.913407 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Feb  9 19:27:10.942651 amazon-ssm-agent[1538]: Initializing new seelog logger
Feb  9 19:27:10.942651 amazon-ssm-agent[1538]: New Seelog Logger Creation Complete
Feb  9 19:27:10.942651 amazon-ssm-agent[1538]: 2024/02/09 19:27:10 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json.
Feb  9 19:27:10.942651 amazon-ssm-agent[1538]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json.
Feb  9 19:27:10.942651 amazon-ssm-agent[1538]: 2024/02/09 19:27:10 processing appconfig overrides
Feb  9 19:27:10.942971 update_engine[1556]: I0209 19:27:10.942376  1556 main.cc:92] Flatcar Update Engine starting
Feb  9 19:27:10.950591 polkitd[1643]: Started polkitd version 121
Feb  9 19:27:11.021224 systemd[1]: Started update-engine.service.
Feb  9 19:27:11.022479 update_engine[1556]: I0209 19:27:11.021522  1556 update_check_scheduler.cc:74] Next update check in 6m1s
Feb  9 19:27:11.025219 systemd[1]: Started locksmithd.service.
Feb  9 19:27:11.043899 polkitd[1643]: Loading rules from directory /etc/polkit-1/rules.d
Feb  9 19:27:11.043984 polkitd[1643]: Loading rules from directory /usr/share/polkit-1/rules.d
Feb  9 19:27:11.048534 polkitd[1643]: Finished loading, compiling and executing 2 rules
Feb  9 19:27:11.050189 dbus-daemon[1541]: [system] Successfully activated service 'org.freedesktop.PolicyKit1'
Feb  9 19:27:11.050412 systemd[1]: Started polkit.service.
Feb  9 19:27:11.054160 polkitd[1643]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Feb  9 19:27:11.096018 tar[1560]: ./static
Feb  9 19:27:11.105644 systemd-hostnamed[1588]: Hostname set to <ip-172-31-21-113> (transient)
Feb  9 19:27:11.105645 systemd-resolved[1513]: System hostname changed to 'ip-172-31-21-113'.
Feb  9 19:27:11.196616 env[1569]: time="2024-02-09T19:27:11.196554969Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Feb  9 19:27:11.196948 env[1569]: time="2024-02-09T19:27:11.196924295Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Feb  9 19:27:11.199161 env[1569]: time="2024-02-09T19:27:11.199117975Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Feb  9 19:27:11.200743 env[1569]: time="2024-02-09T19:27:11.200713815Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Feb  9 19:27:11.201207 env[1569]: time="2024-02-09T19:27:11.201176690Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Feb  9 19:27:11.207659 env[1569]: time="2024-02-09T19:27:11.207621102Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Feb  9 19:27:11.207937 env[1569]: time="2024-02-09T19:27:11.207911647Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Feb  9 19:27:11.210039 env[1569]: time="2024-02-09T19:27:11.210009107Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Feb  9 19:27:11.210274 env[1569]: time="2024-02-09T19:27:11.210254149Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Feb  9 19:27:11.210702 env[1569]: time="2024-02-09T19:27:11.210657051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Feb  9 19:27:11.211390 env[1569]: time="2024-02-09T19:27:11.211359358Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Feb  9 19:27:11.211485 env[1569]: time="2024-02-09T19:27:11.211470541Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Feb  9 19:27:11.211731 env[1569]: time="2024-02-09T19:27:11.211708357Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Feb  9 19:27:11.211834 env[1569]: time="2024-02-09T19:27:11.211819312Z" level=info msg="metadata content store policy set" policy=shared
Feb  9 19:27:11.220813 env[1569]: time="2024-02-09T19:27:11.220753798Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Feb  9 19:27:11.221009 env[1569]: time="2024-02-09T19:27:11.220988559Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Feb  9 19:27:11.221129 env[1569]: time="2024-02-09T19:27:11.221111991Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Feb  9 19:27:11.221276 env[1569]: time="2024-02-09T19:27:11.221248591Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Feb  9 19:27:11.221425 env[1569]: time="2024-02-09T19:27:11.221408718Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Feb  9 19:27:11.221521 env[1569]: time="2024-02-09T19:27:11.221505496Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Feb  9 19:27:11.221612 env[1569]: time="2024-02-09T19:27:11.221598031Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Feb  9 19:27:11.221715 env[1569]: time="2024-02-09T19:27:11.221700883Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Feb  9 19:27:11.221804 env[1569]: time="2024-02-09T19:27:11.221788115Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Feb  9 19:27:11.221904 env[1569]: time="2024-02-09T19:27:11.221889394Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Feb  9 19:27:11.221996 env[1569]: time="2024-02-09T19:27:11.221981802Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Feb  9 19:27:11.222205 env[1569]: time="2024-02-09T19:27:11.222186288Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Feb  9 19:27:11.222609 env[1569]: time="2024-02-09T19:27:11.222456196Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Feb  9 19:27:11.222954 env[1569]: time="2024-02-09T19:27:11.222934008Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Feb  9 19:27:11.224337 env[1569]: time="2024-02-09T19:27:11.224309660Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Feb  9 19:27:11.224485 env[1569]: time="2024-02-09T19:27:11.224468058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.224580 env[1569]: time="2024-02-09T19:27:11.224565210Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Feb  9 19:27:11.224885 env[1569]: time="2024-02-09T19:27:11.224863655Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.230824 env[1569]: time="2024-02-09T19:27:11.230794028Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.233880 env[1569]: time="2024-02-09T19:27:11.233848737Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.234039 env[1569]: time="2024-02-09T19:27:11.234019063Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.234138 env[1569]: time="2024-02-09T19:27:11.234121908Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.234235 env[1569]: time="2024-02-09T19:27:11.234219604Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.234321 env[1569]: time="2024-02-09T19:27:11.234307466Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.234411 env[1569]: time="2024-02-09T19:27:11.234396566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.237977 env[1569]: time="2024-02-09T19:27:11.237885956Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Feb  9 19:27:11.238355 env[1569]: time="2024-02-09T19:27:11.238334210Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.238474 env[1569]: time="2024-02-09T19:27:11.238458845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.238575 env[1569]: time="2024-02-09T19:27:11.238558775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.238668 env[1569]: time="2024-02-09T19:27:11.238650277Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Feb  9 19:27:11.238783 env[1569]: time="2024-02-09T19:27:11.238764117Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Feb  9 19:27:11.238876 env[1569]: time="2024-02-09T19:27:11.238860316Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Feb  9 19:27:11.238987 env[1569]: time="2024-02-09T19:27:11.238962650Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Feb  9 19:27:11.239165 env[1569]: time="2024-02-09T19:27:11.239148429Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Feb  9 19:27:11.241610 env[1569]: time="2024-02-09T19:27:11.241448274Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Feb  9 19:27:11.244702 env[1569]: time="2024-02-09T19:27:11.242231079Z" level=info msg="Connect containerd service"
Feb  9 19:27:11.244702 env[1569]: time="2024-02-09T19:27:11.242309859Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Feb  9 19:27:11.244702 env[1569]: time="2024-02-09T19:27:11.244285327Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Feb  9 19:27:11.244702 env[1569]: time="2024-02-09T19:27:11.244374366Z" level=info msg="Start subscribing containerd event"
Feb  9 19:27:11.244702 env[1569]: time="2024-02-09T19:27:11.244438770Z" level=info msg="Start recovering state"
Feb  9 19:27:11.244702 env[1569]: time="2024-02-09T19:27:11.244511217Z" level=info msg="Start event monitor"
Feb  9 19:27:11.244702 env[1569]: time="2024-02-09T19:27:11.244524753Z" level=info msg="Start snapshots syncer"
Feb  9 19:27:11.244702 env[1569]: time="2024-02-09T19:27:11.244538349Z" level=info msg="Start cni network conf syncer for default"
Feb  9 19:27:11.244702 env[1569]: time="2024-02-09T19:27:11.244548718Z" level=info msg="Start streaming server"
Feb  9 19:27:11.245050 coreos-metadata[1540]: Feb 09 19:27:11.241 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1
Feb  9 19:27:11.248932 coreos-metadata[1540]: Feb 09 19:27:11.248 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1
Feb  9 19:27:11.251048 coreos-metadata[1540]: Feb 09 19:27:11.250 INFO Fetch successful
Feb  9 19:27:11.251186 coreos-metadata[1540]: Feb 09 19:27:11.251 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1
Feb  9 19:27:11.252613 coreos-metadata[1540]: Feb 09 19:27:11.252 INFO Fetch successful
Feb  9 19:27:11.259790 unknown[1540]: wrote ssh authorized keys file for user: core
Feb  9 19:27:11.277383 env[1569]: time="2024-02-09T19:27:11.277329501Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Feb  9 19:27:11.277589 env[1569]: time="2024-02-09T19:27:11.277570040Z" level=info msg=serving... address=/run/containerd/containerd.sock
Feb  9 19:27:11.277927 systemd[1]: Started containerd.service.
Feb  9 19:27:11.280421 env[1569]: time="2024-02-09T19:27:11.280395175Z" level=info msg="containerd successfully booted in 0.522126s"
Feb  9 19:27:11.300710 update-ssh-keys[1681]: Updated "/home/core/.ssh/authorized_keys"
Feb  9 19:27:11.303710 systemd[1]: Finished coreos-metadata-sshkeys@core.service.
Feb  9 19:27:11.327508 tar[1560]: ./vlan
Feb  9 19:27:11.528957 tar[1560]: ./portmap
Feb  9 19:27:11.627754 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Create new startup processor
Feb  9 19:27:11.628986 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [LongRunningPluginsManager] registered plugins: {}
Feb  9 19:27:11.633574 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Initializing bookkeeping folders
Feb  9 19:27:11.633725 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO removing the completed state files
Feb  9 19:27:11.633787 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Initializing bookkeeping folders for long running plugins
Feb  9 19:27:11.633905 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Initializing replies folder for MDS reply requests that couldn't reach the service
Feb  9 19:27:11.634020 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Initializing healthcheck folders for long running plugins
Feb  9 19:27:11.634082 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Initializing locations for inventory plugin
Feb  9 19:27:11.634152 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Initializing default location for custom inventory
Feb  9 19:27:11.634375 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Initializing default location for file inventory
Feb  9 19:27:11.634460 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Initializing default location for role inventory
Feb  9 19:27:11.634529 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Init the cloudwatchlogs publisher
Feb  9 19:27:11.634714 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform independent plugin aws:refreshAssociation
Feb  9 19:27:11.635075 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform independent plugin aws:configurePackage
Feb  9 19:27:11.635148 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform independent plugin aws:downloadContent
Feb  9 19:27:11.635499 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform independent plugin aws:runDocument
Feb  9 19:27:11.635588 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform independent plugin aws:softwareInventory
Feb  9 19:27:11.639751 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform independent plugin aws:runPowerShellScript
Feb  9 19:27:11.644789 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform independent plugin aws:updateSsmAgent
Feb  9 19:27:11.644929 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform independent plugin aws:configureDocker
Feb  9 19:27:11.645005 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform independent plugin aws:runDockerAction
Feb  9 19:27:11.645074 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Successfully loaded platform dependent plugin aws:runShellScript
Feb  9 19:27:11.645143 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0
Feb  9 19:27:11.645211 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO OS: linux, Arch: amd64
Feb  9 19:27:11.658432 amazon-ssm-agent[1538]: datastore file /var/lib/amazon/ssm/i-0b0200694691cd654/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute
Feb  9 19:27:11.741184 tar[1560]: ./host-local
Feb  9 19:27:11.748961 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] Starting document processing engine...
Feb  9 19:27:11.843869 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] [EngineProcessor] Starting
Feb  9 19:27:11.907348 tar[1560]: ./vrf
Feb  9 19:27:11.938859 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing
Feb  9 19:27:12.013060 tar[1560]: ./bridge
Feb  9 19:27:12.032741 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] Starting message polling
Feb  9 19:27:12.127770 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] Starting send replies to MDS
Feb  9 19:27:12.139880 tar[1560]: ./tuning
Feb  9 19:27:12.222358 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [instanceID=i-0b0200694691cd654] Starting association polling
Feb  9 19:27:12.238668 tar[1560]: ./firewall
Feb  9 19:27:12.317428 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting
Feb  9 19:27:12.353642 tar[1560]: ./host-device
Feb  9 19:27:12.412774 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] [Association] Launching response handler
Feb  9 19:27:12.450057 tar[1560]: ./sbr
Feb  9 19:27:12.495285 tar[1562]: linux-amd64/LICENSE
Feb  9 19:27:12.500836 tar[1562]: linux-amd64/README.md
Feb  9 19:27:12.508161 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing
Feb  9 19:27:12.515550 systemd[1]: Finished prepare-helm.service.
Feb  9 19:27:12.538240 tar[1560]: ./loopback
Feb  9 19:27:12.590194 tar[1560]: ./dhcp
Feb  9 19:27:12.603797 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service
Feb  9 19:27:12.699741 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized
Feb  9 19:27:12.765412 tar[1560]: ./ptp
Feb  9 19:27:12.782336 systemd[1]: Finished prepare-critools.service.
Feb  9 19:27:12.795854 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessageGatewayService] Starting session document processing engine...
Feb  9 19:27:12.824498 tar[1560]: ./ipvlan
Feb  9 19:27:12.880088 tar[1560]: ./bandwidth
Feb  9 19:27:12.892315 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessageGatewayService] [EngineProcessor] Starting
Feb  9 19:27:12.988772 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module.
Feb  9 19:27:12.998923 systemd[1]: Finished prepare-cni-plugins.service.
Feb  9 19:27:13.085627 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0b0200694691cd654, requestId: 58fa5222-6210-4d5c-9f38-4971440a2301
Feb  9 19:27:13.182453 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [HealthCheck] HealthCheck reporting agent health.
Feb  9 19:27:13.279708 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [OfflineService] Starting document processing engine...
Feb  9 19:27:13.336875 sshd_keygen[1572]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Feb  9 19:27:13.369733 systemd[1]: Finished sshd-keygen.service.
Feb  9 19:27:13.373520 systemd[1]: Starting issuegen.service...
Feb  9 19:27:13.376873 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [OfflineService] [EngineProcessor] Starting
Feb  9 19:27:13.382464 systemd[1]: issuegen.service: Deactivated successfully.
Feb  9 19:27:13.382637 systemd[1]: Finished issuegen.service.
Feb  9 19:27:13.385603 systemd[1]: Starting systemd-user-sessions.service...
Feb  9 19:27:13.398800 systemd[1]: Finished systemd-user-sessions.service.
Feb  9 19:27:13.404851 systemd[1]: Started getty@tty1.service.
Feb  9 19:27:13.408526 systemd[1]: Started serial-getty@ttyS0.service.
Feb  9 19:27:13.410017 systemd[1]: Reached target getty.target.
Feb  9 19:27:13.411117 systemd[1]: Reached target multi-user.target.
Feb  9 19:27:13.415122 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Feb  9 19:27:13.430442 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Feb  9 19:27:13.430649 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Feb  9 19:27:13.432245 systemd[1]: Startup finished in 888ms (kernel) + 15.490s (initrd) + 23.030s (userspace) = 39.408s.
Feb  9 19:27:13.474602 locksmithd[1652]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Feb  9 19:27:13.476856 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [OfflineService] [EngineProcessor] Initial processing
Feb  9 19:27:13.574631 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [OfflineService] Starting message polling
Feb  9 19:27:13.672453 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [OfflineService] Starting send replies to MDS
Feb  9 19:27:13.770493 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [LongRunningPluginsManager] starting long running plugin manager
Feb  9 19:27:13.868799 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute
Feb  9 19:27:13.967163 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessageGatewayService] listening reply.
Feb  9 19:27:14.065839 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [StartupProcessor] Executing startup processor tasks
Feb  9 19:27:14.165205 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running
Feb  9 19:27:14.264160 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk
Feb  9 19:27:14.363396 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2
Feb  9 19:27:14.462875 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck
Feb  9 19:27:14.562483 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0b0200694691cd654?role=subscribe&stream=input
Feb  9 19:27:14.662263 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0b0200694691cd654?role=subscribe&stream=input
Feb  9 19:27:14.762329 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessageGatewayService] Starting receiving message from control channel
Feb  9 19:27:14.862460 amazon-ssm-agent[1538]: 2024-02-09 19:27:11 INFO [MessageGatewayService] [EngineProcessor] Initial processing
Feb  9 19:27:16.688671 systemd[1]: Created slice system-sshd.slice.
Feb  9 19:27:16.690452 systemd[1]: Started sshd@0-172.31.21.113:22-139.178.68.195:57024.service.
Feb  9 19:27:17.138361 sshd[1771]: Accepted publickey for core from 139.178.68.195 port 57024 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:27:17.141130 sshd[1771]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:27:17.154359 systemd[1]: Created slice user-500.slice.
Feb  9 19:27:17.155924 systemd[1]: Starting user-runtime-dir@500.service...
Feb  9 19:27:17.160736 systemd-logind[1552]: New session 1 of user core.
Feb  9 19:27:17.168255 systemd[1]: Finished user-runtime-dir@500.service.
Feb  9 19:27:17.170587 systemd[1]: Starting user@500.service...
Feb  9 19:27:17.174461 (systemd)[1774]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:27:17.326497 systemd[1774]: Queued start job for default target default.target.
Feb  9 19:27:17.327287 systemd[1774]: Reached target paths.target.
Feb  9 19:27:17.327322 systemd[1774]: Reached target sockets.target.
Feb  9 19:27:17.327340 systemd[1774]: Reached target timers.target.
Feb  9 19:27:17.327357 systemd[1774]: Reached target basic.target.
Feb  9 19:27:17.327415 systemd[1774]: Reached target default.target.
Feb  9 19:27:17.327455 systemd[1774]: Startup finished in 145ms.
Feb  9 19:27:17.328073 systemd[1]: Started user@500.service.
Feb  9 19:27:17.329391 systemd[1]: Started session-1.scope.
Feb  9 19:27:17.485876 systemd[1]: Started sshd@1-172.31.21.113:22-139.178.68.195:57036.service.
Feb  9 19:27:17.666676 sshd[1783]: Accepted publickey for core from 139.178.68.195 port 57036 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:27:17.668511 sshd[1783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:27:17.676443 systemd-logind[1552]: New session 2 of user core.
Feb  9 19:27:17.677508 systemd[1]: Started session-2.scope.
Feb  9 19:27:17.822555 sshd[1783]: pam_unix(sshd:session): session closed for user core
Feb  9 19:27:17.827908 systemd[1]: sshd@1-172.31.21.113:22-139.178.68.195:57036.service: Deactivated successfully.
Feb  9 19:27:17.828938 systemd[1]: session-2.scope: Deactivated successfully.
Feb  9 19:27:17.829923 systemd-logind[1552]: Session 2 logged out. Waiting for processes to exit.
Feb  9 19:27:17.831910 systemd-logind[1552]: Removed session 2.
Feb  9 19:27:17.852912 systemd[1]: Started sshd@2-172.31.21.113:22-139.178.68.195:57046.service.
Feb  9 19:27:18.026006 sshd[1789]: Accepted publickey for core from 139.178.68.195 port 57046 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:27:18.027551 sshd[1789]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:27:18.032748 systemd-logind[1552]: New session 3 of user core.
Feb  9 19:27:18.033748 systemd[1]: Started session-3.scope.
Feb  9 19:27:18.156729 sshd[1789]: pam_unix(sshd:session): session closed for user core
Feb  9 19:27:18.161088 systemd[1]: sshd@2-172.31.21.113:22-139.178.68.195:57046.service: Deactivated successfully.
Feb  9 19:27:18.162014 systemd[1]: session-3.scope: Deactivated successfully.
Feb  9 19:27:18.162658 systemd-logind[1552]: Session 3 logged out. Waiting for processes to exit.
Feb  9 19:27:18.163774 systemd-logind[1552]: Removed session 3.
Feb  9 19:27:18.193077 systemd[1]: Started sshd@3-172.31.21.113:22-139.178.68.195:57060.service.
Feb  9 19:27:18.369835 sshd[1795]: Accepted publickey for core from 139.178.68.195 port 57060 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:27:18.373178 sshd[1795]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:27:18.393236 systemd-logind[1552]: New session 4 of user core.
Feb  9 19:27:18.393659 systemd[1]: Started session-4.scope.
Feb  9 19:27:18.549173 sshd[1795]: pam_unix(sshd:session): session closed for user core
Feb  9 19:27:18.556467 systemd[1]: sshd@3-172.31.21.113:22-139.178.68.195:57060.service: Deactivated successfully.
Feb  9 19:27:18.557666 systemd[1]: session-4.scope: Deactivated successfully.
Feb  9 19:27:18.558751 systemd-logind[1552]: Session 4 logged out. Waiting for processes to exit.
Feb  9 19:27:18.559981 systemd-logind[1552]: Removed session 4.
Feb  9 19:27:18.576443 systemd[1]: Started sshd@4-172.31.21.113:22-139.178.68.195:57072.service.
Feb  9 19:27:18.748985 sshd[1801]: Accepted publickey for core from 139.178.68.195 port 57072 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:27:18.751158 sshd[1801]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:27:18.757310 systemd[1]: Started session-5.scope.
Feb  9 19:27:18.758369 systemd-logind[1552]: New session 5 of user core.
Feb  9 19:27:18.999714 sudo[1804]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Feb  9 19:27:19.000582 sudo[1804]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 19:27:19.010937 dbus-daemon[1541]: \xd0]\x85\u000byU:  received setenforce notice (enforcing=1053186384)
Feb  9 19:27:19.013079 sudo[1804]: pam_unix(sudo:session): session closed for user root
Feb  9 19:27:19.038597 sshd[1801]: pam_unix(sshd:session): session closed for user core
Feb  9 19:27:19.043848 systemd[1]: sshd@4-172.31.21.113:22-139.178.68.195:57072.service: Deactivated successfully.
Feb  9 19:27:19.046128 systemd[1]: session-5.scope: Deactivated successfully.
Feb  9 19:27:19.047714 systemd-logind[1552]: Session 5 logged out. Waiting for processes to exit.
Feb  9 19:27:19.049096 systemd-logind[1552]: Removed session 5.
Feb  9 19:27:19.069174 systemd[1]: Started sshd@5-172.31.21.113:22-139.178.68.195:57082.service.
Feb  9 19:27:19.248253 sshd[1808]: Accepted publickey for core from 139.178.68.195 port 57082 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:27:19.250411 sshd[1808]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:27:19.258895 systemd-logind[1552]: New session 6 of user core.
Feb  9 19:27:19.259525 systemd[1]: Started session-6.scope.
Feb  9 19:27:19.369554 sudo[1812]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Feb  9 19:27:19.369882 sudo[1812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 19:27:19.373793 sudo[1812]: pam_unix(sudo:session): session closed for user root
Feb  9 19:27:19.379180 sudo[1811]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Feb  9 19:27:19.379638 sudo[1811]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 19:27:19.396945 systemd[1]: Stopping audit-rules.service...
Feb  9 19:27:19.399000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Feb  9 19:27:19.404755 kernel: kauditd_printk_skb: 193 callbacks suppressed
Feb  9 19:27:19.404869 kernel: audit: type=1305 audit(1707506839.399:174): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Feb  9 19:27:19.399000 audit[1815]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe6e2de9d0 a2=420 a3=0 items=0 ppid=1 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:19.409664 auditctl[1815]: No rules
Feb  9 19:27:19.417203 kernel: audit: type=1300 audit(1707506839.399:174): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe6e2de9d0 a2=420 a3=0 items=0 ppid=1 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:19.417315 kernel: audit: type=1327 audit(1707506839.399:174): proctitle=2F7362696E2F617564697463746C002D44
Feb  9 19:27:19.399000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Feb  9 19:27:19.410879 systemd[1]: audit-rules.service: Deactivated successfully.
Feb  9 19:27:19.411091 systemd[1]: Stopped audit-rules.service.
Feb  9 19:27:19.418075 systemd[1]: Starting audit-rules.service...
Feb  9 19:27:19.425139 kernel: audit: type=1131 audit(1707506839.409:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.447656 augenrules[1832]: No rules
Feb  9 19:27:19.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.449422 sudo[1811]: pam_unix(sudo:session): session closed for user root
Feb  9 19:27:19.448289 systemd[1]: Finished audit-rules.service.
Feb  9 19:27:19.448000 audit[1811]: USER_END pid=1811 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.459552 kernel: audit: type=1130 audit(1707506839.447:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.459623 kernel: audit: type=1106 audit(1707506839.448:177): pid=1811 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.459654 kernel: audit: type=1104 audit(1707506839.448:178): pid=1811 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.448000 audit[1811]: CRED_DISP pid=1811 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.472775 sshd[1808]: pam_unix(sshd:session): session closed for user core
Feb  9 19:27:19.476267 systemd[1]: sshd@5-172.31.21.113:22-139.178.68.195:57082.service: Deactivated successfully.
Feb  9 19:27:19.477114 systemd[1]: session-6.scope: Deactivated successfully.
Feb  9 19:27:19.473000 audit[1808]: USER_END pid=1808 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:27:19.478726 systemd-logind[1552]: Session 6 logged out. Waiting for processes to exit.
Feb  9 19:27:19.480007 systemd-logind[1552]: Removed session 6.
Feb  9 19:27:19.473000 audit[1808]: CRED_DISP pid=1808 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:27:19.490226 kernel: audit: type=1106 audit(1707506839.473:179): pid=1808 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:27:19.490312 kernel: audit: type=1104 audit(1707506839.473:180): pid=1808 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:27:19.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.113:22-139.178.68.195:57082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.490703 kernel: audit: type=1131 audit(1707506839.475:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.113:22-139.178.68.195:57082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.113:22-139.178.68.195:57098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.500656 systemd[1]: Started sshd@6-172.31.21.113:22-139.178.68.195:57098.service.
Feb  9 19:27:19.668000 audit[1838]: USER_ACCT pid=1838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:27:19.670034 sshd[1838]: Accepted publickey for core from 139.178.68.195 port 57098 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:27:19.670000 audit[1838]: CRED_ACQ pid=1838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:27:19.670000 audit[1838]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1546f9a0 a2=3 a3=0 items=0 ppid=1 pid=1838 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:19.670000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:27:19.671902 sshd[1838]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:27:19.677632 systemd[1]: Started session-7.scope.
Feb  9 19:27:19.678297 systemd-logind[1552]: New session 7 of user core.
Feb  9 19:27:19.683000 audit[1838]: USER_START pid=1838 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:27:19.685000 audit[1840]: CRED_ACQ pid=1840 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:27:19.783000 audit[1841]: USER_ACCT pid=1841 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.783000 audit[1841]: CRED_REFR pid=1841 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:19.784034 sudo[1841]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Feb  9 19:27:19.785083 sudo[1841]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 19:27:19.786000 audit[1841]: USER_START pid=1841 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:20.646218 systemd[1]: Starting docker.service...
Feb  9 19:27:20.693408 env[1856]: time="2024-02-09T19:27:20.693347171Z" level=info msg="Starting up"
Feb  9 19:27:20.695650 env[1856]: time="2024-02-09T19:27:20.695619976Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Feb  9 19:27:20.695796 env[1856]: time="2024-02-09T19:27:20.695781851Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Feb  9 19:27:20.695857 env[1856]: time="2024-02-09T19:27:20.695845543Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Feb  9 19:27:20.695911 env[1856]: time="2024-02-09T19:27:20.695902630Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Feb  9 19:27:20.698057 env[1856]: time="2024-02-09T19:27:20.698024450Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Feb  9 19:27:20.698057 env[1856]: time="2024-02-09T19:27:20.698044360Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Feb  9 19:27:20.698243 env[1856]: time="2024-02-09T19:27:20.698064244Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Feb  9 19:27:20.698243 env[1856]: time="2024-02-09T19:27:20.698078070Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Feb  9 19:27:20.704472 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2484069602-merged.mount: Deactivated successfully.
Feb  9 19:27:20.945290 env[1856]: time="2024-02-09T19:27:20.945242806Z" level=info msg="Loading containers: start."
Feb  9 19:27:21.015000 audit[1887]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.015000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe40e14fd0 a2=0 a3=7ffe40e14fbc items=0 ppid=1856 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552
Feb  9 19:27:21.018000 audit[1889]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.018000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffcc66cfe0 a2=0 a3=7fffcc66cfcc items=0 ppid=1856 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.018000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552
Feb  9 19:27:21.021000 audit[1891]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.021000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe33a86600 a2=0 a3=7ffe33a865ec items=0 ppid=1856 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.021000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31
Feb  9 19:27:21.023000 audit[1893]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.023000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffde692aaf0 a2=0 a3=7ffde692aadc items=0 ppid=1856 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.023000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32
Feb  9 19:27:21.027000 audit[1895]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1895 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.027000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff41bd50c0 a2=0 a3=7fff41bd50ac items=0 ppid=1856 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.027000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E
Feb  9 19:27:21.048000 audit[1900]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.048000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6f03faf0 a2=0 a3=7ffc6f03fadc items=0 ppid=1856 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.048000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E
Feb  9 19:27:21.060000 audit[1902]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.060000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe422fc400 a2=0 a3=7ffe422fc3ec items=0 ppid=1856 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552
Feb  9 19:27:21.063000 audit[1904]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.063000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdf764e450 a2=0 a3=7ffdf764e43c items=0 ppid=1856 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.063000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E
Feb  9 19:27:21.067000 audit[1906]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.067000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd26404150 a2=0 a3=7ffd2640413c items=0 ppid=1856 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.067000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Feb  9 19:27:21.080000 audit[1910]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.080000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd4ef20510 a2=0 a3=7ffd4ef204fc items=0 ppid=1856 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Feb  9 19:27:21.082000 audit[1911]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.082000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd4bdbd3c0 a2=0 a3=7ffd4bdbd3ac items=0 ppid=1856 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.082000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Feb  9 19:27:21.212797 kernel: Initializing XFRM netlink socket
Feb  9 19:27:21.365919 env[1856]: time="2024-02-09T19:27:21.365877744Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address"
Feb  9 19:27:21.367570 (udev-worker)[1867]: Network interface NamePolicy= disabled on kernel command line.
Feb  9 19:27:21.514000 audit[1919]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.514000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffbf728e00 a2=0 a3=7fffbf728dec items=0 ppid=1856 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.514000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445
Feb  9 19:27:21.527000 audit[1922]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.527000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe7c906960 a2=0 a3=7ffe7c90694c items=0 ppid=1856 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.527000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E
Feb  9 19:27:21.531000 audit[1925]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.531000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffef90c7800 a2=0 a3=7ffef90c77ec items=0 ppid=1856 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054
Feb  9 19:27:21.534000 audit[1927]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.534000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdbb974110 a2=0 a3=7ffdbb9740fc items=0 ppid=1856 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054
Feb  9 19:27:21.544000 audit[1929]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.544000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff351d7880 a2=0 a3=7fff351d786c items=0 ppid=1856 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552
Feb  9 19:27:21.550000 audit[1931]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.550000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc04873b60 a2=0 a3=7ffc04873b4c items=0 ppid=1856 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.550000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38
Feb  9 19:27:21.553000 audit[1933]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.553000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe3a372a70 a2=0 a3=7ffe3a372a5c items=0 ppid=1856 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.553000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552
Feb  9 19:27:21.565000 audit[1936]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.565000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffba85d1c0 a2=0 a3=7fffba85d1ac items=0 ppid=1856 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.565000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054
Feb  9 19:27:21.567000 audit[1938]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.567000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffda712cc30 a2=0 a3=7ffda712cc1c items=0 ppid=1856 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.567000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31
Feb  9 19:27:21.571000 audit[1940]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.571000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffb27ad7d0 a2=0 a3=7fffb27ad7bc items=0 ppid=1856 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.571000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32
Feb  9 19:27:21.574000 audit[1942]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.574000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc38c2f870 a2=0 a3=7ffc38c2f85c items=0 ppid=1856 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.574000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50
Feb  9 19:27:21.575878 systemd-networkd[1376]: docker0: Link UP
Feb  9 19:27:21.590000 audit[1946]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.590000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd4268be30 a2=0 a3=7ffd4268be1c items=0 ppid=1856 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.590000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Feb  9 19:27:21.591000 audit[1947]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:21.591000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc41868390 a2=0 a3=7ffc4186837c items=0 ppid=1856 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:21.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Feb  9 19:27:21.593062 env[1856]: time="2024-02-09T19:27:21.593027984Z" level=info msg="Loading containers: done."
Feb  9 19:27:21.609974 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3106423595-merged.mount: Deactivated successfully.
Feb  9 19:27:21.715318 env[1856]: time="2024-02-09T19:27:21.715263177Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2
Feb  9 19:27:21.715979 env[1856]: time="2024-02-09T19:27:21.715496866Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23
Feb  9 19:27:21.715979 env[1856]: time="2024-02-09T19:27:21.715625204Z" level=info msg="Daemon has completed initialization"
Feb  9 19:27:21.758408 systemd[1]: Started docker.service.
Feb  9 19:27:21.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:21.775243 env[1856]: time="2024-02-09T19:27:21.775163459Z" level=info msg="API listen on /run/docker.sock"
Feb  9 19:27:21.829065 systemd[1]: Reloading.
Feb  9 19:27:21.936028 /usr/lib/systemd/system-generators/torcx-generator[1995]: time="2024-02-09T19:27:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 19:27:21.936072 /usr/lib/systemd/system-generators/torcx-generator[1995]: time="2024-02-09T19:27:21Z" level=info msg="torcx already run"
Feb  9 19:27:22.042569 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 19:27:22.042596 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 19:27:22.062574 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 19:27:22.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.143000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.143000 audit: BPF prog-id=40 op=LOAD
Feb  9 19:27:22.143000 audit: BPF prog-id=38 op=UNLOAD
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit: BPF prog-id=41 op=LOAD
Feb  9 19:27:22.144000 audit: BPF prog-id=27 op=UNLOAD
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit: BPF prog-id=42 op=LOAD
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.144000 audit: BPF prog-id=43 op=LOAD
Feb  9 19:27:22.144000 audit: BPF prog-id=28 op=UNLOAD
Feb  9 19:27:22.144000 audit: BPF prog-id=29 op=UNLOAD
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit: BPF prog-id=44 op=LOAD
Feb  9 19:27:22.146000 audit: BPF prog-id=21 op=UNLOAD
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.146000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit: BPF prog-id=45 op=LOAD
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit: BPF prog-id=46 op=LOAD
Feb  9 19:27:22.147000 audit: BPF prog-id=22 op=UNLOAD
Feb  9 19:27:22.147000 audit: BPF prog-id=23 op=UNLOAD
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit: BPF prog-id=47 op=LOAD
Feb  9 19:27:22.147000 audit: BPF prog-id=35 op=UNLOAD
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.147000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit: BPF prog-id=48 op=LOAD
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit: BPF prog-id=49 op=LOAD
Feb  9 19:27:22.148000 audit: BPF prog-id=36 op=UNLOAD
Feb  9 19:27:22.148000 audit: BPF prog-id=37 op=UNLOAD
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit: BPF prog-id=50 op=LOAD
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.148000 audit: BPF prog-id=51 op=LOAD
Feb  9 19:27:22.148000 audit: BPF prog-id=24 op=UNLOAD
Feb  9 19:27:22.148000 audit: BPF prog-id=25 op=UNLOAD
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.151000 audit: BPF prog-id=52 op=LOAD
Feb  9 19:27:22.151000 audit: BPF prog-id=30 op=UNLOAD
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.153000 audit: BPF prog-id=53 op=LOAD
Feb  9 19:27:22.153000 audit: BPF prog-id=26 op=UNLOAD
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.154000 audit: BPF prog-id=54 op=LOAD
Feb  9 19:27:22.154000 audit: BPF prog-id=31 op=UNLOAD
Feb  9 19:27:22.156000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.156000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.156000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.156000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.156000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.156000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.156000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.156000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.156000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit: BPF prog-id=55 op=LOAD
Feb  9 19:27:22.157000 audit: BPF prog-id=32 op=UNLOAD
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit: BPF prog-id=56 op=LOAD
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:22.157000 audit: BPF prog-id=57 op=LOAD
Feb  9 19:27:22.157000 audit: BPF prog-id=33 op=UNLOAD
Feb  9 19:27:22.157000 audit: BPF prog-id=34 op=UNLOAD
Feb  9 19:27:22.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:22.172332 systemd[1]: Started kubelet.service.
Feb  9 19:27:22.252542 kubelet[2046]: E0209 19:27:22.252471    2046 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Feb  9 19:27:22.254577 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Feb  9 19:27:22.254761 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Feb  9 19:27:22.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 19:27:24.930900 env[1569]: time="2024-02-09T19:27:24.930768294Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\""
Feb  9 19:27:25.684457 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2575606640.mount: Deactivated successfully.
Feb  9 19:27:26.610574 amazon-ssm-agent[1538]: 2024-02-09 19:27:26 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds.
Feb  9 19:27:30.472322 env[1569]: time="2024-02-09T19:27:30.472258284Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:30.563553 env[1569]: time="2024-02-09T19:27:30.563496480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:30.618944 env[1569]: time="2024-02-09T19:27:30.618891906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:30.702902 env[1569]: time="2024-02-09T19:27:30.702850661Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:30.703515 env[1569]: time="2024-02-09T19:27:30.703473152Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\""
Feb  9 19:27:30.715608 env[1569]: time="2024-02-09T19:27:30.715564694Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\""
Feb  9 19:27:32.426016 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1.
Feb  9 19:27:32.437003 kernel: kauditd_printk_skb: 292 callbacks suppressed
Feb  9 19:27:32.437096 kernel: audit: type=1130 audit(1707506852.424:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:32.437133 kernel: audit: type=1131 audit(1707506852.424:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:32.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:32.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:32.426289 systemd[1]: Stopped kubelet.service.
Feb  9 19:27:32.428242 systemd[1]: Started kubelet.service.
Feb  9 19:27:32.445262 kernel: audit: type=1130 audit(1707506852.426:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:32.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:32.521741 kubelet[2073]: E0209 19:27:32.521679    2073 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Feb  9 19:27:32.526379 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Feb  9 19:27:32.526549 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Feb  9 19:27:32.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 19:27:32.532721 kernel: audit: type=1131 audit(1707506852.525:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 19:27:34.963702 env[1569]: time="2024-02-09T19:27:34.963634826Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:35.073244 env[1569]: time="2024-02-09T19:27:35.073193986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:35.136419 env[1569]: time="2024-02-09T19:27:35.136373064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:35.238878 env[1569]: time="2024-02-09T19:27:35.238444816Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:35.239648 env[1569]: time="2024-02-09T19:27:35.239596931Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\""
Feb  9 19:27:35.269319 env[1569]: time="2024-02-09T19:27:35.269146425Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\""
Feb  9 19:27:38.393831 env[1569]: time="2024-02-09T19:27:38.393713574Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:38.514311 env[1569]: time="2024-02-09T19:27:38.514258796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:38.624158 env[1569]: time="2024-02-09T19:27:38.624111375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:38.648500 amazon-ssm-agent[1538]: 2024-02-09 19:27:38 INFO [HealthCheck] HealthCheck reporting agent health.
Feb  9 19:27:38.697920 env[1569]: time="2024-02-09T19:27:38.697869184Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:38.698916 env[1569]: time="2024-02-09T19:27:38.698870200Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\""
Feb  9 19:27:38.714933 env[1569]: time="2024-02-09T19:27:38.714888610Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\""
Feb  9 19:27:41.133241 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Feb  9 19:27:41.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:41.141717 kernel: audit: type=1131 audit(1707506861.132:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:41.167620 kernel: audit: type=1334 audit(1707506861.161:429): prog-id=49 op=UNLOAD
Feb  9 19:27:41.167832 kernel: audit: type=1334 audit(1707506861.161:430): prog-id=48 op=UNLOAD
Feb  9 19:27:41.167901 kernel: audit: type=1334 audit(1707506861.161:431): prog-id=47 op=UNLOAD
Feb  9 19:27:41.161000 audit: BPF prog-id=49 op=UNLOAD
Feb  9 19:27:41.161000 audit: BPF prog-id=48 op=UNLOAD
Feb  9 19:27:41.161000 audit: BPF prog-id=47 op=UNLOAD
Feb  9 19:27:41.274806 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3522799059.mount: Deactivated successfully.
Feb  9 19:27:41.944765 env[1569]: time="2024-02-09T19:27:41.944709542Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:41.948109 env[1569]: time="2024-02-09T19:27:41.948066053Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:41.951021 env[1569]: time="2024-02-09T19:27:41.950969249Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:41.954488 env[1569]: time="2024-02-09T19:27:41.954430426Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:41.955415 env[1569]: time="2024-02-09T19:27:41.955345787Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\""
Feb  9 19:27:41.970334 env[1569]: time="2024-02-09T19:27:41.970291684Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\""
Feb  9 19:27:42.583166 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2.
Feb  9 19:27:42.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:42.583399 systemd[1]: Stopped kubelet.service.
Feb  9 19:27:42.590922 kernel: audit: type=1130 audit(1707506862.582:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:42.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:42.606153 kernel: audit: type=1131 audit(1707506862.589:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:42.606278 kernel: audit: type=1130 audit(1707506862.597:434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:42.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:42.598035 systemd[1]: Started kubelet.service.
Feb  9 19:27:42.601648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1747200108.mount: Deactivated successfully.
Feb  9 19:27:42.679426 env[1569]: time="2024-02-09T19:27:42.679373041Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:42.683340 env[1569]: time="2024-02-09T19:27:42.683293718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:42.685944 env[1569]: time="2024-02-09T19:27:42.685904484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:42.689053 env[1569]: time="2024-02-09T19:27:42.689013880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:42.689602 env[1569]: time="2024-02-09T19:27:42.689565485Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\""
Feb  9 19:27:42.696079 kubelet[2098]: E0209 19:27:42.696014    2098 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Feb  9 19:27:42.700631 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Feb  9 19:27:42.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 19:27:42.700837 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Feb  9 19:27:42.709710 kernel: audit: type=1131 audit(1707506862.700:435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 19:27:42.712038 env[1569]: time="2024-02-09T19:27:42.712000723Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\""
Feb  9 19:27:43.813155 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount751521692.mount: Deactivated successfully.
Feb  9 19:27:52.512522 env[1569]: time="2024-02-09T19:27:52.512473137Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:52.623646 env[1569]: time="2024-02-09T19:27:52.623594652Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:52.748625 env[1569]: time="2024-02-09T19:27:52.748571971Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:52.836390 env[1569]: time="2024-02-09T19:27:52.836071924Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:52.837460 env[1569]: time="2024-02-09T19:27:52.837414116Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\""
Feb  9 19:27:52.867897 env[1569]: time="2024-02-09T19:27:52.867847791Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\""
Feb  9 19:27:52.926152 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3.
Feb  9 19:27:52.926426 systemd[1]: Stopped kubelet.service.
Feb  9 19:27:52.933729 kernel: audit: type=1130 audit(1707506872.924:436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:52.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:52.928602 systemd[1]: Started kubelet.service.
Feb  9 19:27:52.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:52.945333 kernel: audit: type=1131 audit(1707506872.924:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:52.945511 kernel: audit: type=1130 audit(1707506872.927:438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:52.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:52.999501 kubelet[2116]: E0209 19:27:52.999378    2116 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Feb  9 19:27:53.001911 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Feb  9 19:27:53.002079 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Feb  9 19:27:53.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 19:27:53.010707 kernel: audit: type=1131 audit(1707506873.000:439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 19:27:54.051759 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount698604727.mount: Deactivated successfully.
Feb  9 19:27:55.337072 env[1569]: time="2024-02-09T19:27:55.337012407Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:55.341392 env[1569]: time="2024-02-09T19:27:55.341344085Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:55.344608 env[1569]: time="2024-02-09T19:27:55.344565667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:55.347530 env[1569]: time="2024-02-09T19:27:55.347470497Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:27:55.348290 env[1569]: time="2024-02-09T19:27:55.348259579Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\""
Feb  9 19:27:56.039615 update_engine[1556]: I0209 19:27:56.038795  1556 update_attempter.cc:509] Updating boot flags...
Feb  9 19:27:56.671083 amazon-ssm-agent[1538]: 2024-02-09 19:27:56 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated
Feb  9 19:27:58.721849 systemd[1]: Stopped kubelet.service.
Feb  9 19:27:58.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:58.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:58.736945 kernel: audit: type=1130 audit(1707506878.721:440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:58.737104 kernel: audit: type=1131 audit(1707506878.723:441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:58.759431 systemd[1]: Reloading.
Feb  9 19:27:58.892427 /usr/lib/systemd/system-generators/torcx-generator[2471]: time="2024-02-09T19:27:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 19:27:58.892463 /usr/lib/systemd/system-generators/torcx-generator[2471]: time="2024-02-09T19:27:58Z" level=info msg="torcx already run"
Feb  9 19:27:59.057656 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 19:27:59.057699 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 19:27:59.090545 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 19:27:59.199000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.199000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209523 kernel: audit: type=1400 audit(1707506879.199:442): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209784 kernel: audit: type=1400 audit(1707506879.199:443): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.199000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.223364 kernel: audit: type=1400 audit(1707506879.199:444): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.223736 kernel: audit: type=1400 audit(1707506879.199:445): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.199000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.199000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.231999 kernel: audit: type=1400 audit(1707506879.199:446): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.199000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.244800 kernel: audit: type=1400 audit(1707506879.199:447): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.244913 kernel: audit: type=1400 audit(1707506879.199:448): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.244954 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Feb  9 19:27:59.199000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.199000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.199000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit: BPF prog-id=58 op=LOAD
Feb  9 19:27:59.209000 audit: BPF prog-id=40 op=UNLOAD
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.209000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.216000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.216000 audit: BPF prog-id=59 op=LOAD
Feb  9 19:27:59.216000 audit: BPF prog-id=41 op=UNLOAD
Feb  9 19:27:59.216000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.216000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.216000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.216000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.216000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.216000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.216000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.216000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.222000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.222000 audit: BPF prog-id=60 op=LOAD
Feb  9 19:27:59.222000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.222000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.222000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.222000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.222000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.222000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.222000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.222000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.223000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.223000 audit: BPF prog-id=61 op=LOAD
Feb  9 19:27:59.223000 audit: BPF prog-id=42 op=UNLOAD
Feb  9 19:27:59.223000 audit: BPF prog-id=43 op=UNLOAD
Feb  9 19:27:59.231000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.231000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.231000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.231000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.239000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.239000 audit: BPF prog-id=62 op=LOAD
Feb  9 19:27:59.239000 audit: BPF prog-id=44 op=UNLOAD
Feb  9 19:27:59.239000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.239000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.239000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.244000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.244000 audit: BPF prog-id=63 op=LOAD
Feb  9 19:27:59.244000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.244000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.244000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.244000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.244000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit: BPF prog-id=64 op=LOAD
Feb  9 19:27:59.245000 audit: BPF prog-id=45 op=UNLOAD
Feb  9 19:27:59.245000 audit: BPF prog-id=46 op=UNLOAD
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit: BPF prog-id=65 op=LOAD
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.245000 audit: BPF prog-id=66 op=LOAD
Feb  9 19:27:59.246000 audit: BPF prog-id=50 op=UNLOAD
Feb  9 19:27:59.246000 audit: BPF prog-id=51 op=UNLOAD
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.249000 audit: BPF prog-id=67 op=LOAD
Feb  9 19:27:59.249000 audit: BPF prog-id=52 op=UNLOAD
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.251000 audit: BPF prog-id=68 op=LOAD
Feb  9 19:27:59.251000 audit: BPF prog-id=53 op=UNLOAD
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.254000 audit: BPF prog-id=69 op=LOAD
Feb  9 19:27:59.254000 audit: BPF prog-id=54 op=UNLOAD
Feb  9 19:27:59.255000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.255000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.255000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.255000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.255000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.255000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.255000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.255000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.255000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit: BPF prog-id=70 op=LOAD
Feb  9 19:27:59.256000 audit: BPF prog-id=55 op=UNLOAD
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit: BPF prog-id=71 op=LOAD
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.256000 audit: BPF prog-id=72 op=LOAD
Feb  9 19:27:59.256000 audit: BPF prog-id=56 op=UNLOAD
Feb  9 19:27:59.256000 audit: BPF prog-id=57 op=UNLOAD
Feb  9 19:27:59.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:27:59.278107 systemd[1]: Started kubelet.service.
Feb  9 19:27:59.337944 kubelet[2524]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 19:27:59.338325 kubelet[2524]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 19:27:59.338503 kubelet[2524]: I0209 19:27:59.338471    2524 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Feb  9 19:27:59.340754 kubelet[2524]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 19:27:59.340887 kubelet[2524]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 19:27:59.669525 kubelet[2524]: I0209 19:27:59.669418    2524 server.go:412] "Kubelet version" kubeletVersion="v1.26.5"
Feb  9 19:27:59.669525 kubelet[2524]: I0209 19:27:59.669449    2524 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Feb  9 19:27:59.671146 kubelet[2524]: I0209 19:27:59.671116    2524 server.go:836] "Client rotation is on, will bootstrap in background"
Feb  9 19:27:59.678370 kubelet[2524]: E0209 19:27:59.678343    2524 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.113:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.678597 kubelet[2524]: I0209 19:27:59.678580    2524 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Feb  9 19:27:59.680964 kubelet[2524]: I0209 19:27:59.680935    2524 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Feb  9 19:27:59.681223 kubelet[2524]: I0209 19:27:59.681205    2524 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Feb  9 19:27:59.681312 kubelet[2524]: I0209 19:27:59.681295    2524 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Feb  9 19:27:59.681784 kubelet[2524]: I0209 19:27:59.681327    2524 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Feb  9 19:27:59.681784 kubelet[2524]: I0209 19:27:59.681343    2524 container_manager_linux.go:308] "Creating device plugin manager"
Feb  9 19:27:59.682042 kubelet[2524]: I0209 19:27:59.681883    2524 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 19:27:59.686448 kubelet[2524]: I0209 19:27:59.686423    2524 kubelet.go:398] "Attempting to sync node with API server"
Feb  9 19:27:59.686448 kubelet[2524]: I0209 19:27:59.686449    2524 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests"
Feb  9 19:27:59.686654 kubelet[2524]: I0209 19:27:59.686480    2524 kubelet.go:297] "Adding apiserver pod source"
Feb  9 19:27:59.686654 kubelet[2524]: I0209 19:27:59.686497    2524 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Feb  9 19:27:59.687889 kubelet[2524]: W0209 19:27:59.687766    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.688048 kubelet[2524]: E0209 19:27:59.688037    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.688220 kubelet[2524]: W0209 19:27:59.688190    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-113&limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.688431 kubelet[2524]: E0209 19:27:59.688417    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-113&limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.688698 kubelet[2524]: I0209 19:27:59.688669    2524 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Feb  9 19:27:59.689129 kubelet[2524]: W0209 19:27:59.689115    2524 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Feb  9 19:27:59.689935 kubelet[2524]: I0209 19:27:59.689918    2524 server.go:1186] "Started kubelet"
Feb  9 19:27:59.693000 audit[2524]: AVC avc:  denied  { mac_admin } for  pid=2524 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.693000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 19:27:59.693000 audit[2524]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7a2a0 a1=c0006b5908 a2=c000b7a270 a3=25 items=0 ppid=1 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.693000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 19:27:59.694593 kubelet[2524]: I0209 19:27:59.694574    2524 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Feb  9 19:27:59.694000 audit[2524]: AVC avc:  denied  { mac_admin } for  pid=2524 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.694000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 19:27:59.694000 audit[2524]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b543e0 a1=c0006b5920 a2=c000b7a330 a3=25 items=0 ppid=1 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.694000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 19:27:59.695425 kubelet[2524]: I0209 19:27:59.695407    2524 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Feb  9 19:27:59.695782 kubelet[2524]: I0209 19:27:59.695680    2524 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Feb  9 19:27:59.696367 kubelet[2524]: E0209 19:27:59.696252    2524 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-21-113.17b24875d773975d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-21-113", UID:"ip-172-31-21-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-21-113"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 27, 59, 689889629, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 27, 59, 689889629, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.21.113:6443/api/v1/namespaces/default/events": dial tcp 172.31.21.113:6443: connect: connection refused'(may retry after sleeping)
Feb  9 19:27:59.697117 kubelet[2524]: E0209 19:27:59.696752    2524 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Feb  9 19:27:59.697117 kubelet[2524]: E0209 19:27:59.696780    2524 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Feb  9 19:27:59.697117 kubelet[2524]: I0209 19:27:59.697025    2524 server.go:161] "Starting to listen" address="0.0.0.0" port=10250
Feb  9 19:27:59.698247 kubelet[2524]: I0209 19:27:59.698227    2524 server.go:451] "Adding debug handlers to kubelet server"
Feb  9 19:27:59.702111 kubelet[2524]: I0209 19:27:59.700614    2524 volume_manager.go:293] "Starting Kubelet Volume Manager"
Feb  9 19:27:59.703510 kubelet[2524]: I0209 19:27:59.703486    2524 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Feb  9 19:27:59.704092 kubelet[2524]: W0209 19:27:59.704047    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.704169 kubelet[2524]: E0209 19:27:59.704105    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.705941 kubelet[2524]: E0209 19:27:59.704755    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:27:59.705941 kubelet[2524]: E0209 19:27:59.705167    2524 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.21.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-113?timeout=10s": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.708000 audit[2535]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2535 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.708000 audit[2535]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1d038990 a2=0 a3=7ffd1d03897c items=0 ppid=2524 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Feb  9 19:27:59.711000 audit[2536]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.711000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc28e97aa0 a2=0 a3=7ffc28e97a8c items=0 ppid=2524 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Feb  9 19:27:59.728000 audit[2538]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2538 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.728000 audit[2538]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffca46ae960 a2=0 a3=7ffca46ae94c items=0 ppid=2524 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 19:27:59.741000 audit[2542]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.741000 audit[2542]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeec0a1220 a2=0 a3=7ffeec0a120c items=0 ppid=2524 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 19:27:59.744591 kubelet[2524]: I0209 19:27:59.744557    2524 cpu_manager.go:214] "Starting CPU manager" policy="none"
Feb  9 19:27:59.744781 kubelet[2524]: I0209 19:27:59.744616    2524 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Feb  9 19:27:59.744781 kubelet[2524]: I0209 19:27:59.744633    2524 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 19:27:59.755000 audit[2545]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2545 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.755000 audit[2545]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff37af9d70 a2=0 a3=7fff37af9d5c items=0 ppid=2524 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Feb  9 19:27:59.756000 audit[2546]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.756000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffb53b7b70 a2=0 a3=7fffb53b7b5c items=0 ppid=2524 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Feb  9 19:27:59.763903 kubelet[2524]: I0209 19:27:59.763851    2524 policy_none.go:49] "None policy: Start"
Feb  9 19:27:59.764727 kubelet[2524]: I0209 19:27:59.764702    2524 memory_manager.go:169] "Starting memorymanager" policy="None"
Feb  9 19:27:59.764849 kubelet[2524]: I0209 19:27:59.764733    2524 state_mem.go:35] "Initializing new in-memory state store"
Feb  9 19:27:59.801952 systemd[1]: Created slice kubepods.slice.
Feb  9 19:27:59.819438 systemd[1]: Created slice kubepods-burstable.slice.
Feb  9 19:27:59.826198 kubelet[2524]: I0209 19:27:59.821204    2524 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-113"
Feb  9 19:27:59.826198 kubelet[2524]: E0209 19:27:59.823233    2524 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.113:6443/api/v1/nodes\": dial tcp 172.31.21.113:6443: connect: connection refused" node="ip-172-31-21-113"
Feb  9 19:27:59.826136 systemd[1]: Created slice kubepods-besteffort.slice.
Feb  9 19:27:59.830000 audit[2550]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2550 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.830000 audit[2550]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeb49affa0 a2=0 a3=7ffeb49aff8c items=0 ppid=2524 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Feb  9 19:27:59.834660 kubelet[2524]: I0209 19:27:59.834609    2524 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Feb  9 19:27:59.833000 audit[2524]: AVC avc:  denied  { mac_admin } for  pid=2524 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:27:59.833000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 19:27:59.833000 audit[2524]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c56120 a1=c000c32978 a2=c000c56060 a3=25 items=0 ppid=1 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.833000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 19:27:59.835149 kubelet[2524]: I0209 19:27:59.834860    2524 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Feb  9 19:27:59.835149 kubelet[2524]: I0209 19:27:59.835078    2524 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Feb  9 19:27:59.837596 kubelet[2524]: E0209 19:27:59.837578    2524 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-21-113\" not found"
Feb  9 19:27:59.838000 audit[2553]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2553 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.838000 audit[2553]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc0d9fe140 a2=0 a3=7ffc0d9fe12c items=0 ppid=2524 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Feb  9 19:27:59.840000 audit[2554]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.840000 audit[2554]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe31cffb10 a2=0 a3=7ffe31cffafc items=0 ppid=2524 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Feb  9 19:27:59.841000 audit[2555]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2555 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.841000 audit[2555]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedeb54f60 a2=0 a3=7ffedeb54f4c items=0 ppid=2524 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Feb  9 19:27:59.844000 audit[2557]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.844000 audit[2557]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe6022d020 a2=0 a3=7ffe6022d00c items=0 ppid=2524 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Feb  9 19:27:59.847000 audit[2559]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2559 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.847000 audit[2559]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffeeaf3ef00 a2=0 a3=7ffeeaf3eeec items=0 ppid=2524 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Feb  9 19:27:59.850000 audit[2561]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2561 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.850000 audit[2561]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff314a4460 a2=0 a3=7fff314a444c items=0 ppid=2524 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Feb  9 19:27:59.852000 audit[2563]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2563 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.852000 audit[2563]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff0a599840 a2=0 a3=7fff0a59982c items=0 ppid=2524 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Feb  9 19:27:59.856000 audit[2565]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2565 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.856000 audit[2565]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffd88ac2400 a2=0 a3=7ffd88ac23ec items=0 ppid=2524 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Feb  9 19:27:59.857190 kubelet[2524]: I0209 19:27:59.857167    2524 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Feb  9 19:27:59.857000 audit[2566]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2566 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.857000 audit[2566]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1250a180 a2=0 a3=7fff1250a16c items=0 ppid=2524 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Feb  9 19:27:59.858000 audit[2567]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2567 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.858000 audit[2567]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd92fb460 a2=0 a3=7ffdd92fb44c items=0 ppid=2524 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Feb  9 19:27:59.859000 audit[2568]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2568 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.859000 audit[2568]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff0a15fb50 a2=0 a3=7fff0a15fb3c items=0 ppid=2524 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.859000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Feb  9 19:27:59.859000 audit[2569]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2569 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.859000 audit[2569]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb48f3d50 a2=0 a3=7ffeb48f3d3c items=0 ppid=2524 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Feb  9 19:27:59.861000 audit[2571]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:27:59.861000 audit[2571]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffefdb7020 a2=0 a3=7fffefdb700c items=0 ppid=2524 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Feb  9 19:27:59.862000 audit[2572]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2572 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.862000 audit[2572]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcf8d0a620 a2=0 a3=7ffcf8d0a60c items=0 ppid=2524 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Feb  9 19:27:59.863000 audit[2573]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2573 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.863000 audit[2573]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcc3308e30 a2=0 a3=7ffcc3308e1c items=0 ppid=2524 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Feb  9 19:27:59.866000 audit[2575]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2575 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.866000 audit[2575]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffdc7e1b3b0 a2=0 a3=7ffdc7e1b39c items=0 ppid=2524 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Feb  9 19:27:59.867000 audit[2576]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.867000 audit[2576]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdcea7d150 a2=0 a3=7ffdcea7d13c items=0 ppid=2524 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.867000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Feb  9 19:27:59.868000 audit[2577]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2577 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.868000 audit[2577]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec9744c90 a2=0 a3=7ffec9744c7c items=0 ppid=2524 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Feb  9 19:27:59.871000 audit[2579]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2579 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.871000 audit[2579]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd78879320 a2=0 a3=7ffd7887930c items=0 ppid=2524 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Feb  9 19:27:59.873000 audit[2581]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2581 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.873000 audit[2581]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffec3490c60 a2=0 a3=7ffec3490c4c items=0 ppid=2524 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.873000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Feb  9 19:27:59.876000 audit[2583]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2583 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.876000 audit[2583]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffcb7e06c50 a2=0 a3=7ffcb7e06c3c items=0 ppid=2524 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.876000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Feb  9 19:27:59.878000 audit[2585]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.878000 audit[2585]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff0fc5fcc0 a2=0 a3=7fff0fc5fcac items=0 ppid=2524 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Feb  9 19:27:59.882000 audit[2587]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2587 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.882000 audit[2587]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffffc29de20 a2=0 a3=7ffffc29de0c items=0 ppid=2524 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Feb  9 19:27:59.883264 kubelet[2524]: I0209 19:27:59.883241    2524 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Feb  9 19:27:59.883264 kubelet[2524]: I0209 19:27:59.883267    2524 status_manager.go:176] "Starting to sync pod status with apiserver"
Feb  9 19:27:59.883403 kubelet[2524]: I0209 19:27:59.883291    2524 kubelet.go:2113] "Starting kubelet main sync loop"
Feb  9 19:27:59.883403 kubelet[2524]: E0209 19:27:59.883339    2524 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Feb  9 19:27:59.884297 kubelet[2524]: W0209 19:27:59.884268    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.884420 kubelet[2524]: E0209 19:27:59.884304    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.884000 audit[2588]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2588 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.884000 audit[2588]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb11bc740 a2=0 a3=7ffdb11bc72c items=0 ppid=2524 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Feb  9 19:27:59.885000 audit[2589]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2589 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.885000 audit[2589]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4fb677a0 a2=0 a3=7ffc4fb6778c items=0 ppid=2524 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Feb  9 19:27:59.886000 audit[2590]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2590 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:27:59.886000 audit[2590]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdffadc470 a2=0 a3=7ffdffadc45c items=0 ppid=2524 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:27:59.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Feb  9 19:27:59.906571 kubelet[2524]: E0209 19:27:59.906527    2524 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.21.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-113?timeout=10s": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:27:59.983973 kubelet[2524]: I0209 19:27:59.983927    2524 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:27:59.985732 kubelet[2524]: I0209 19:27:59.985706    2524 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:27:59.987608 kubelet[2524]: I0209 19:27:59.987290    2524 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:27:59.989192 kubelet[2524]: I0209 19:27:59.989052    2524 status_manager.go:698] "Failed to get status for pod" podUID=de9e66061818337f4252227662efdea1 pod="kube-system/kube-apiserver-ip-172-31-21-113" err="Get \"https://172.31.21.113:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-21-113\": dial tcp 172.31.21.113:6443: connect: connection refused"
Feb  9 19:27:59.990549 kubelet[2524]: I0209 19:27:59.990294    2524 status_manager.go:698] "Failed to get status for pod" podUID=721ba73fc1631859cdb396ad904149ae pod="kube-system/kube-controller-manager-ip-172-31-21-113" err="Get \"https://172.31.21.113:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-21-113\": dial tcp 172.31.21.113:6443: connect: connection refused"
Feb  9 19:27:59.992276 kubelet[2524]: I0209 19:27:59.992250    2524 status_manager.go:698] "Failed to get status for pod" podUID=82bb7db77ee4264d1cf076c84145e983 pod="kube-system/kube-scheduler-ip-172-31-21-113" err="Get \"https://172.31.21.113:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-21-113\": dial tcp 172.31.21.113:6443: connect: connection refused"
Feb  9 19:27:59.995734 systemd[1]: Created slice kubepods-burstable-podde9e66061818337f4252227662efdea1.slice.
Feb  9 19:28:00.008884 systemd[1]: Created slice kubepods-burstable-pod721ba73fc1631859cdb396ad904149ae.slice.
Feb  9 19:28:00.017018 systemd[1]: Created slice kubepods-burstable-pod82bb7db77ee4264d1cf076c84145e983.slice.
Feb  9 19:28:00.021034 kubelet[2524]: I0209 19:28:00.010413    2524 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/de9e66061818337f4252227662efdea1-ca-certs\") pod \"kube-apiserver-ip-172-31-21-113\" (UID: \"de9e66061818337f4252227662efdea1\") " pod="kube-system/kube-apiserver-ip-172-31-21-113"
Feb  9 19:28:00.021034 kubelet[2524]: I0209 19:28:00.010451    2524 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/de9e66061818337f4252227662efdea1-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-113\" (UID: \"de9e66061818337f4252227662efdea1\") " pod="kube-system/kube-apiserver-ip-172-31-21-113"
Feb  9 19:28:00.021034 kubelet[2524]: I0209 19:28:00.010481    2524 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:00.021034 kubelet[2524]: I0209 19:28:00.010502    2524 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:00.021034 kubelet[2524]: I0209 19:28:00.010524    2524 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/82bb7db77ee4264d1cf076c84145e983-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-113\" (UID: \"82bb7db77ee4264d1cf076c84145e983\") " pod="kube-system/kube-scheduler-ip-172-31-21-113"
Feb  9 19:28:00.021191 kubelet[2524]: I0209 19:28:00.010553    2524 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/de9e66061818337f4252227662efdea1-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-113\" (UID: \"de9e66061818337f4252227662efdea1\") " pod="kube-system/kube-apiserver-ip-172-31-21-113"
Feb  9 19:28:00.021191 kubelet[2524]: I0209 19:28:00.010575    2524 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:00.021191 kubelet[2524]: I0209 19:28:00.010595    2524 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:00.021191 kubelet[2524]: I0209 19:28:00.010621    2524 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:00.025803 kubelet[2524]: I0209 19:28:00.025771    2524 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-113"
Feb  9 19:28:00.026185 kubelet[2524]: E0209 19:28:00.026160    2524 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.113:6443/api/v1/nodes\": dial tcp 172.31.21.113:6443: connect: connection refused" node="ip-172-31-21-113"
Feb  9 19:28:00.305241 env[1569]: time="2024-02-09T19:28:00.304664908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-113,Uid:de9e66061818337f4252227662efdea1,Namespace:kube-system,Attempt:0,}"
Feb  9 19:28:00.307258 kubelet[2524]: E0209 19:28:00.307222    2524 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.21.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-113?timeout=10s": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:00.316047 env[1569]: time="2024-02-09T19:28:00.316002627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-113,Uid:721ba73fc1631859cdb396ad904149ae,Namespace:kube-system,Attempt:0,}"
Feb  9 19:28:00.320241 env[1569]: time="2024-02-09T19:28:00.320093772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-113,Uid:82bb7db77ee4264d1cf076c84145e983,Namespace:kube-system,Attempt:0,}"
Feb  9 19:28:00.429951 kubelet[2524]: I0209 19:28:00.429673    2524 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-113"
Feb  9 19:28:00.430334 kubelet[2524]: E0209 19:28:00.430025    2524 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.113:6443/api/v1/nodes\": dial tcp 172.31.21.113:6443: connect: connection refused" node="ip-172-31-21-113"
Feb  9 19:28:00.936474 kubelet[2524]: W0209 19:28:00.936426    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:00.936474 kubelet[2524]: E0209 19:28:00.936477    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:01.029864 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2609731121.mount: Deactivated successfully.
Feb  9 19:28:01.042358 env[1569]: time="2024-02-09T19:28:01.042303724Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.044185 env[1569]: time="2024-02-09T19:28:01.044136257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.049296 env[1569]: time="2024-02-09T19:28:01.049229463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.051189 env[1569]: time="2024-02-09T19:28:01.051146637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.052932 env[1569]: time="2024-02-09T19:28:01.052894614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.054793 env[1569]: time="2024-02-09T19:28:01.054756817Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.056481 env[1569]: time="2024-02-09T19:28:01.056389178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.058625 env[1569]: time="2024-02-09T19:28:01.058589357Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.064816 env[1569]: time="2024-02-09T19:28:01.064772434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.068810 env[1569]: time="2024-02-09T19:28:01.068657976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.079676 env[1569]: time="2024-02-09T19:28:01.079615900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.108673 kubelet[2524]: E0209 19:28:01.108582    2524 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.21.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-113?timeout=10s": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:01.160886 env[1569]: time="2024-02-09T19:28:01.160834734Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:01.188505 env[1569]: time="2024-02-09T19:28:01.188366328Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:28:01.188505 env[1569]: time="2024-02-09T19:28:01.188411451Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:28:01.188914 env[1569]: time="2024-02-09T19:28:01.188426784Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:28:01.189476 env[1569]: time="2024-02-09T19:28:01.189320786Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da41ca1ad13199ae1788d5962bc197ed464ba7e394221a6b324503cf60c0a9a6 pid=2597 runtime=io.containerd.runc.v2
Feb  9 19:28:01.196979 kubelet[2524]: W0209 19:28:01.196530    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:01.197135 kubelet[2524]: E0209 19:28:01.197000    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:01.231634 systemd[1]: Started cri-containerd-da41ca1ad13199ae1788d5962bc197ed464ba7e394221a6b324503cf60c0a9a6.scope.
Feb  9 19:28:01.241711 env[1569]: time="2024-02-09T19:28:01.240956323Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:28:01.241711 env[1569]: time="2024-02-09T19:28:01.241028913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:28:01.241711 env[1569]: time="2024-02-09T19:28:01.241046015Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:28:01.242677 kubelet[2524]: I0209 19:28:01.242440    2524 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-113"
Feb  9 19:28:01.242949 kubelet[2524]: E0209 19:28:01.242927    2524 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.113:6443/api/v1/nodes\": dial tcp 172.31.21.113:6443: connect: connection refused" node="ip-172-31-21-113"
Feb  9 19:28:01.244471 env[1569]: time="2024-02-09T19:28:01.243188814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc9a6e19ddea057136545b44dda724e72e8be2a797c9561ae56448eaea55a170 pid=2624 runtime=io.containerd.runc.v2
Feb  9 19:28:01.253058 kubelet[2524]: W0209 19:28:01.252958    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-113&limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:01.253058 kubelet[2524]: E0209 19:28:01.253036    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-113&limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:01.260227 kubelet[2524]: W0209 19:28:01.260071    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:01.260582 kubelet[2524]: E0209 19:28:01.260203    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:01.275000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.275000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.275000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.275000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.275000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.275000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.275000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.275000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.275000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit: BPF prog-id=73 op=LOAD
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2597 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343163613161643133313939616531373838643539363262633139
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2597 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343163613161643133313939616531373838643539363262633139
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit: BPF prog-id=74 op=LOAD
Feb  9 19:28:01.276000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002983d0 items=0 ppid=2597 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343163613161643133313939616531373838643539363262633139
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.276000 audit: BPF prog-id=75 op=LOAD
Feb  9 19:28:01.276000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000298418 items=0 ppid=2597 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343163613161643133313939616531373838643539363262633139
Feb  9 19:28:01.276000 audit: BPF prog-id=75 op=UNLOAD
Feb  9 19:28:01.276000 audit: BPF prog-id=74 op=UNLOAD
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { perfmon } for  pid=2609 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit[2609]: AVC avc:  denied  { bpf } for  pid=2609 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.277000 audit: BPF prog-id=76 op=LOAD
Feb  9 19:28:01.277000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000298828 items=0 ppid=2597 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343163613161643133313939616531373838643539363262633139
Feb  9 19:28:01.287020 env[1569]: time="2024-02-09T19:28:01.280424215Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:28:01.287020 env[1569]: time="2024-02-09T19:28:01.286056146Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:28:01.287020 env[1569]: time="2024-02-09T19:28:01.286072774Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:28:01.287020 env[1569]: time="2024-02-09T19:28:01.286384130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dfb8208553edb07695aa55f0ce31403f32811945e74dd1238032fcdb42dcf61e pid=2651 runtime=io.containerd.runc.v2
Feb  9 19:28:01.308662 systemd[1]: Started cri-containerd-fc9a6e19ddea057136545b44dda724e72e8be2a797c9561ae56448eaea55a170.scope.
Feb  9 19:28:01.344427 systemd[1]: Started cri-containerd-dfb8208553edb07695aa55f0ce31403f32811945e74dd1238032fcdb42dcf61e.scope.
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.364000 audit: BPF prog-id=77 op=LOAD
Feb  9 19:28:01.365000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.365000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2624 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396136653139646465613035373133363534356234346464613732
Feb  9 19:28:01.365000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.365000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2624 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396136653139646465613035373133363534356234346464613732
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.368000 audit: BPF prog-id=78 op=LOAD
Feb  9 19:28:01.368000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003936f0 items=0 ppid=2624 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396136653139646465613035373133363534356234346464613732
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit: BPF prog-id=79 op=LOAD
Feb  9 19:28:01.369000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000393738 items=0 ppid=2624 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396136653139646465613035373133363534356234346464613732
Feb  9 19:28:01.369000 audit: BPF prog-id=79 op=UNLOAD
Feb  9 19:28:01.369000 audit: BPF prog-id=78 op=UNLOAD
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { perfmon } for  pid=2642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit[2642]: AVC avc:  denied  { bpf } for  pid=2642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.369000 audit: BPF prog-id=80 op=LOAD
Feb  9 19:28:01.369000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000393b48 items=0 ppid=2624 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396136653139646465613035373133363534356234346464613732
Feb  9 19:28:01.413398 env[1569]: time="2024-02-09T19:28:01.413351262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-113,Uid:de9e66061818337f4252227662efdea1,Namespace:kube-system,Attempt:0,} returns sandbox id \"da41ca1ad13199ae1788d5962bc197ed464ba7e394221a6b324503cf60c0a9a6\""
Feb  9 19:28:01.419847 env[1569]: time="2024-02-09T19:28:01.419800617Z" level=info msg="CreateContainer within sandbox \"da41ca1ad13199ae1788d5962bc197ed464ba7e394221a6b324503cf60c0a9a6\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}"
Feb  9 19:28:01.433000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.433000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.433000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.433000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.433000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.433000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.433000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.433000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.433000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.436000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.436000 audit: BPF prog-id=81 op=LOAD
Feb  9 19:28:01.440000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.440000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2651 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623832303835353365646230373639356161353566306365333134
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2651 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623832303835353365646230373639356161353566306365333134
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit: BPF prog-id=82 op=LOAD
Feb  9 19:28:01.441000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000267350 items=0 ppid=2651 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623832303835353365646230373639356161353566306365333134
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.441000 audit: BPF prog-id=83 op=LOAD
Feb  9 19:28:01.441000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000267398 items=0 ppid=2651 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623832303835353365646230373639356161353566306365333134
Feb  9 19:28:01.442000 audit: BPF prog-id=83 op=UNLOAD
Feb  9 19:28:01.442000 audit: BPF prog-id=82 op=UNLOAD
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { perfmon } for  pid=2666 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit[2666]: AVC avc:  denied  { bpf } for  pid=2666 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:01.442000 audit: BPF prog-id=84 op=LOAD
Feb  9 19:28:01.442000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002677a8 items=0 ppid=2651 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:01.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623832303835353365646230373639356161353566306365333134
Feb  9 19:28:01.483028 env[1569]: time="2024-02-09T19:28:01.482926669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-113,Uid:721ba73fc1631859cdb396ad904149ae,Namespace:kube-system,Attempt:0,} returns sandbox id \"fc9a6e19ddea057136545b44dda724e72e8be2a797c9561ae56448eaea55a170\""
Feb  9 19:28:01.488580 env[1569]: time="2024-02-09T19:28:01.488528338Z" level=info msg="CreateContainer within sandbox \"fc9a6e19ddea057136545b44dda724e72e8be2a797c9561ae56448eaea55a170\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}"
Feb  9 19:28:01.521961 env[1569]: time="2024-02-09T19:28:01.521904460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-113,Uid:82bb7db77ee4264d1cf076c84145e983,Namespace:kube-system,Attempt:0,} returns sandbox id \"dfb8208553edb07695aa55f0ce31403f32811945e74dd1238032fcdb42dcf61e\""
Feb  9 19:28:01.535147 env[1569]: time="2024-02-09T19:28:01.535091648Z" level=info msg="CreateContainer within sandbox \"dfb8208553edb07695aa55f0ce31403f32811945e74dd1238032fcdb42dcf61e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}"
Feb  9 19:28:01.806834 kubelet[2524]: E0209 19:28:01.806227    2524 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.113:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:02.085737 env[1569]: time="2024-02-09T19:28:02.085510092Z" level=info msg="CreateContainer within sandbox \"da41ca1ad13199ae1788d5962bc197ed464ba7e394221a6b324503cf60c0a9a6\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c44dec04571cc39ee348dcf677c7d2737668fe2250bd09401c0d09012615b7d2\""
Feb  9 19:28:02.087062 env[1569]: time="2024-02-09T19:28:02.086997007Z" level=info msg="StartContainer for \"c44dec04571cc39ee348dcf677c7d2737668fe2250bd09401c0d09012615b7d2\""
Feb  9 19:28:02.094121 env[1569]: time="2024-02-09T19:28:02.094042164Z" level=info msg="CreateContainer within sandbox \"dfb8208553edb07695aa55f0ce31403f32811945e74dd1238032fcdb42dcf61e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57\""
Feb  9 19:28:02.099336 env[1569]: time="2024-02-09T19:28:02.099247338Z" level=info msg="CreateContainer within sandbox \"fc9a6e19ddea057136545b44dda724e72e8be2a797c9561ae56448eaea55a170\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c\""
Feb  9 19:28:02.100739 env[1569]: time="2024-02-09T19:28:02.100653075Z" level=info msg="StartContainer for \"778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57\""
Feb  9 19:28:02.101606 env[1569]: time="2024-02-09T19:28:02.101274380Z" level=info msg="StartContainer for \"fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c\""
Feb  9 19:28:02.184574 systemd[1]: Started cri-containerd-c44dec04571cc39ee348dcf677c7d2737668fe2250bd09401c0d09012615b7d2.scope.
Feb  9 19:28:02.216268 systemd[1]: Started cri-containerd-778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57.scope.
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.225000 audit: BPF prog-id=85 op=LOAD
Feb  9 19:28:02.232000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.232000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2597 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334346465633034353731636333396565333438646366363737633764
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2597 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334346465633034353731636333396565333438646366363737633764
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.233000 audit: BPF prog-id=86 op=LOAD
Feb  9 19:28:02.233000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003e0b40 items=0 ppid=2597 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334346465633034353731636333396565333438646366363737633764
Feb  9 19:28:02.236344 systemd[1]: Started cri-containerd-fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c.scope.
Feb  9 19:28:02.236000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.236000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.236000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.236000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.236000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.236000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.236000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.236000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.236000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.236000 audit: BPF prog-id=87 op=LOAD
Feb  9 19:28:02.236000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003e0b88 items=0 ppid=2597 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334346465633034353731636333396565333438646366363737633764
Feb  9 19:28:02.238000 audit: BPF prog-id=87 op=UNLOAD
Feb  9 19:28:02.238000 audit: BPF prog-id=86 op=UNLOAD
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { perfmon } for  pid=2731 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit[2731]: AVC avc:  denied  { bpf } for  pid=2731 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.238000 audit: BPF prog-id=88 op=LOAD
Feb  9 19:28:02.238000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003e0f98 items=0 ppid=2597 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334346465633034353731636333396565333438646366363737633764
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.300000 audit: BPF prog-id=89 op=LOAD
Feb  9 19:28:02.301000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.301000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2651 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737383336343039376631623839626531386461356132366563633337
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2651 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737383336343039376631623839626531386461356132366563633337
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.302000 audit: BPF prog-id=90 op=LOAD
Feb  9 19:28:02.302000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003da520 items=0 ppid=2651 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737383336343039376631623839626531386461356132366563633337
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit: BPF prog-id=91 op=LOAD
Feb  9 19:28:02.304000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003da568 items=0 ppid=2651 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737383336343039376631623839626531386461356132366563633337
Feb  9 19:28:02.304000 audit: BPF prog-id=91 op=UNLOAD
Feb  9 19:28:02.304000 audit: BPF prog-id=90 op=UNLOAD
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { perfmon } for  pid=2742 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit[2742]: AVC avc:  denied  { bpf } for  pid=2742 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.304000 audit: BPF prog-id=92 op=LOAD
Feb  9 19:28:02.304000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da978 items=0 ppid=2651 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737383336343039376631623839626531386461356132366563633337
Feb  9 19:28:02.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.309000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.309000 audit: BPF prog-id=93 op=LOAD
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2624 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613431386461396236623935353566346163633536313237326364
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2624 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613431386461396236623935353566346163633536313237326364
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.311000 audit: BPF prog-id=94 op=LOAD
Feb  9 19:28:02.311000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000382e80 items=0 ppid=2624 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613431386461396236623935353566346163633536313237326364
Feb  9 19:28:02.315000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.315000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.315000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.315000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.315000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.315000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.315000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.315000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.315000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.315000 audit: BPF prog-id=95 op=LOAD
Feb  9 19:28:02.315000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000382ec8 items=0 ppid=2624 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613431386461396236623935353566346163633536313237326364
Feb  9 19:28:02.316000 audit: BPF prog-id=95 op=UNLOAD
Feb  9 19:28:02.316000 audit: BPF prog-id=94 op=UNLOAD
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { perfmon } for  pid=2761 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit[2761]: AVC avc:  denied  { bpf } for  pid=2761 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:02.316000 audit: BPF prog-id=96 op=LOAD
Feb  9 19:28:02.316000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003832d8 items=0 ppid=2624 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:02.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613431386461396236623935353566346163633536313237326364
Feb  9 19:28:02.403893 env[1569]: time="2024-02-09T19:28:02.403673244Z" level=info msg="StartContainer for \"c44dec04571cc39ee348dcf677c7d2737668fe2250bd09401c0d09012615b7d2\" returns successfully"
Feb  9 19:28:02.467664 env[1569]: time="2024-02-09T19:28:02.467605601Z" level=info msg="StartContainer for \"778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57\" returns successfully"
Feb  9 19:28:02.488257 env[1569]: time="2024-02-09T19:28:02.488204348Z" level=info msg="StartContainer for \"fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c\" returns successfully"
Feb  9 19:28:02.709901 kubelet[2524]: E0209 19:28:02.709833    2524 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: Get "https://172.31.21.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-113?timeout=10s": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:02.846430 kubelet[2524]: I0209 19:28:02.846406    2524 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-113"
Feb  9 19:28:02.849181 kubelet[2524]: E0209 19:28:02.849142    2524 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.113:6443/api/v1/nodes\": dial tcp 172.31.21.113:6443: connect: connection refused" node="ip-172-31-21-113"
Feb  9 19:28:02.887055 kubelet[2524]: W0209 19:28:02.886986    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:02.887328 kubelet[2524]: E0209 19:28:02.887308    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:02.900477 kubelet[2524]: I0209 19:28:02.900451    2524 status_manager.go:698] "Failed to get status for pod" podUID=de9e66061818337f4252227662efdea1 pod="kube-system/kube-apiserver-ip-172-31-21-113" err="Get \"https://172.31.21.113:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-21-113\": dial tcp 172.31.21.113:6443: connect: connection refused"
Feb  9 19:28:02.914601 kubelet[2524]: I0209 19:28:02.914558    2524 status_manager.go:698] "Failed to get status for pod" podUID=82bb7db77ee4264d1cf076c84145e983 pod="kube-system/kube-scheduler-ip-172-31-21-113" err="Get \"https://172.31.21.113:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-21-113\": dial tcp 172.31.21.113:6443: connect: connection refused"
Feb  9 19:28:02.921003 kubelet[2524]: I0209 19:28:02.920971    2524 status_manager.go:698] "Failed to get status for pod" podUID=721ba73fc1631859cdb396ad904149ae pod="kube-system/kube-controller-manager-ip-172-31-21-113" err="Get \"https://172.31.21.113:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-21-113\": dial tcp 172.31.21.113:6443: connect: connection refused"
Feb  9 19:28:03.023035 systemd[1]: run-containerd-runc-k8s.io-c44dec04571cc39ee348dcf677c7d2737668fe2250bd09401c0d09012615b7d2-runc.sdZ7iB.mount: Deactivated successfully.
Feb  9 19:28:03.098653 kubelet[2524]: W0209 19:28:03.098529    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-113&limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:03.098653 kubelet[2524]: E0209 19:28:03.098604    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-113&limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:03.254229 kubelet[2524]: W0209 19:28:03.254166    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:03.254459 kubelet[2524]: E0209 19:28:03.254447    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:03.357044 kubelet[2524]: W0209 19:28:03.356904    2524 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:03.357584 kubelet[2524]: E0209 19:28:03.357561    2524 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.113:6443: connect: connection refused
Feb  9 19:28:04.314000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:04.316542 kernel: kauditd_printk_skb: 620 callbacks suppressed
Feb  9 19:28:04.316614 kernel: audit: type=1400 audit(1707506884.314:758): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:04.314000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003c77d0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:04.332622 kernel: audit: type=1300 audit(1707506884.314:758): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003c77d0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:04.314000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:04.341709 kernel: audit: type=1327 audit(1707506884.314:758): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:04.323000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:04.323000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aae040 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:04.357698 kernel: audit: type=1400 audit(1707506884.323:759): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:04.357841 kernel: audit: type=1300 audit(1707506884.323:759): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aae040 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:04.323000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:04.364659 kernel: audit: type=1327 audit(1707506884.323:759): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:06.052021 kubelet[2524]: I0209 19:28:06.051993    2524 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-113"
Feb  9 19:28:06.247000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:06.260895 kernel: audit: type=1400 audit(1707506886.247:760): avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:06.250000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:06.250000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c0050a8a80 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:28:06.277160 kernel: audit: type=1400 audit(1707506886.250:761): avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:06.277286 kernel: audit: type=1300 audit(1707506886.250:761): arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c0050a8a80 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:28:06.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:28:06.292417 kernel: audit: type=1327 audit(1707506886.250:761): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:28:06.247000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c004ff2000 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:28:06.247000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:28:06.252000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:06.252000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c001d4e040 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:28:06.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:28:06.267000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:06.267000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c004f1cd50 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:28:06.267000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:28:06.274000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:06.274000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c001e76580 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:28:06.274000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:28:06.274000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:06.274000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c005139500 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:28:06.274000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:28:06.619907 kubelet[2524]: E0209 19:28:06.619860    2524 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-21-113\" not found" node="ip-172-31-21-113"
Feb  9 19:28:06.678628 kubelet[2524]: I0209 19:28:06.678595    2524 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-113"
Feb  9 19:28:06.696895 kubelet[2524]: E0209 19:28:06.696863    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:06.798555 kubelet[2524]: E0209 19:28:06.798521    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:06.899468 kubelet[2524]: E0209 19:28:06.899348    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.000561 kubelet[2524]: E0209 19:28:07.000523    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.101403 kubelet[2524]: E0209 19:28:07.101354    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.202082 kubelet[2524]: E0209 19:28:07.202040    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.302621 kubelet[2524]: E0209 19:28:07.302586    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.403212 kubelet[2524]: E0209 19:28:07.403169    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.504933 kubelet[2524]: E0209 19:28:07.504819    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.605443 kubelet[2524]: E0209 19:28:07.605407    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.706273 kubelet[2524]: E0209 19:28:07.706233    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.807867 kubelet[2524]: E0209 19:28:07.807758    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:07.908873 kubelet[2524]: E0209 19:28:07.908826    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:08.009003 kubelet[2524]: E0209 19:28:08.008957    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:08.109902 kubelet[2524]: E0209 19:28:08.109782    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:08.210528 kubelet[2524]: E0209 19:28:08.210475    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:08.311325 kubelet[2524]: E0209 19:28:08.311278    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:08.411821 kubelet[2524]: E0209 19:28:08.411673    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:08.512563 kubelet[2524]: E0209 19:28:08.512393    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:08.613184 kubelet[2524]: E0209 19:28:08.613151    2524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-21-113\" not found"
Feb  9 19:28:08.693821 kubelet[2524]: I0209 19:28:08.693766    2524 apiserver.go:52] "Watching apiserver"
Feb  9 19:28:08.704306 kubelet[2524]: I0209 19:28:08.704260    2524 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Feb  9 19:28:08.782023 kubelet[2524]: I0209 19:28:08.781967    2524 reconciler.go:41] "Reconciler: start to sync state"
Feb  9 19:28:08.939219 systemd[1]: Reloading.
Feb  9 19:28:09.070308 /usr/lib/systemd/system-generators/torcx-generator[2856]: time="2024-02-09T19:28:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 19:28:09.070349 /usr/lib/systemd/system-generators/torcx-generator[2856]: time="2024-02-09T19:28:09Z" level=info msg="torcx already run"
Feb  9 19:28:09.213380 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 19:28:09.213920 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 19:28:09.249773 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 19:28:09.361403 kernel: kauditd_printk_skb: 14 callbacks suppressed
Feb  9 19:28:09.361564 kernel: audit: type=1400 audit(1707506889.352:766): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:09.352000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:09.375868 kernel: audit: type=1300 audit(1707506889.352:766): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000057220 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:09.352000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000057220 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:09.352000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:09.392716 kernel: audit: type=1327 audit(1707506889.352:766): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:09.376000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:09.416324 kernel: audit: type=1400 audit(1707506889.376:767): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:09.416478 kernel: audit: type=1300 audit(1707506889.376:767): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0000574a0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:09.376000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0000574a0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:09.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:09.380000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:09.432304 kernel: audit: type=1327 audit(1707506889.376:767): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:09.432458 kernel: audit: type=1400 audit(1707506889.380:768): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:09.432769 kernel: audit: type=1300 audit(1707506889.380:768): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000057720 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:09.432845 kernel: audit: type=1327 audit(1707506889.380:768): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:09.432882 kernel: audit: type=1400 audit(1707506889.395:769): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:09.380000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000057720 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:09.380000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:09.395000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:28:09.395000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000579a0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:09.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:09.463000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.463000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.463000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.463000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.464000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.464000 audit: BPF prog-id=97 op=LOAD
Feb  9 19:28:09.464000 audit: BPF prog-id=58 op=UNLOAD
Feb  9 19:28:09.465000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.465000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.467000 audit: BPF prog-id=98 op=LOAD
Feb  9 19:28:09.467000 audit: BPF prog-id=81 op=UNLOAD
Feb  9 19:28:09.468000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.468000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.468000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.468000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit: BPF prog-id=99 op=LOAD
Feb  9 19:28:09.469000 audit: BPF prog-id=59 op=UNLOAD
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit: BPF prog-id=100 op=LOAD
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.470000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.470000 audit: BPF prog-id=101 op=LOAD
Feb  9 19:28:09.470000 audit: BPF prog-id=60 op=UNLOAD
Feb  9 19:28:09.470000 audit: BPF prog-id=61 op=UNLOAD
Feb  9 19:28:09.472000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.472000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.472000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.472000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.472000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.472000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.472000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.472000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.472000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit: BPF prog-id=102 op=LOAD
Feb  9 19:28:09.473000 audit: BPF prog-id=62 op=UNLOAD
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit: BPF prog-id=103 op=LOAD
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.473000 audit: BPF prog-id=104 op=LOAD
Feb  9 19:28:09.473000 audit: BPF prog-id=63 op=UNLOAD
Feb  9 19:28:09.473000 audit: BPF prog-id=64 op=UNLOAD
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.474000 audit: BPF prog-id=105 op=LOAD
Feb  9 19:28:09.474000 audit: BPF prog-id=73 op=UNLOAD
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit: BPF prog-id=106 op=LOAD
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.475000 audit: BPF prog-id=107 op=LOAD
Feb  9 19:28:09.475000 audit: BPF prog-id=65 op=UNLOAD
Feb  9 19:28:09.475000 audit: BPF prog-id=66 op=UNLOAD
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.478000 audit: BPF prog-id=108 op=LOAD
Feb  9 19:28:09.479000 audit: BPF prog-id=67 op=UNLOAD
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.480000 audit: BPF prog-id=109 op=LOAD
Feb  9 19:28:09.480000 audit: BPF prog-id=93 op=UNLOAD
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.482000 audit: BPF prog-id=110 op=LOAD
Feb  9 19:28:09.482000 audit: BPF prog-id=89 op=UNLOAD
Feb  9 19:28:09.483000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.483000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.483000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.483000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.483000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.483000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.483000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.483000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.483000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.484000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.484000 audit: BPF prog-id=111 op=LOAD
Feb  9 19:28:09.484000 audit: BPF prog-id=68 op=UNLOAD
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.485000 audit: BPF prog-id=112 op=LOAD
Feb  9 19:28:09.485000 audit: BPF prog-id=69 op=UNLOAD
Feb  9 19:28:09.486000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.486000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.486000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.486000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.486000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.486000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.486000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.486000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.486000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit: BPF prog-id=113 op=LOAD
Feb  9 19:28:09.487000 audit: BPF prog-id=70 op=UNLOAD
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit: BPF prog-id=114 op=LOAD
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.487000 audit: BPF prog-id=115 op=LOAD
Feb  9 19:28:09.487000 audit: BPF prog-id=71 op=UNLOAD
Feb  9 19:28:09.487000 audit: BPF prog-id=72 op=UNLOAD
Feb  9 19:28:09.488000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.488000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.488000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.488000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.488000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.488000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.488000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.488000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.488000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.489000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.489000 audit: BPF prog-id=116 op=LOAD
Feb  9 19:28:09.489000 audit: BPF prog-id=77 op=UNLOAD
Feb  9 19:28:09.492000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.492000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.492000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.492000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.492000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.492000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.492000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.492000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.492000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.493000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.493000 audit: BPF prog-id=117 op=LOAD
Feb  9 19:28:09.493000 audit: BPF prog-id=85 op=UNLOAD
Feb  9 19:28:09.525590 kubelet[2524]: I0209 19:28:09.525549    2524 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Feb  9 19:28:09.526997 systemd[1]: Stopping kubelet.service...
Feb  9 19:28:09.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:28:09.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:28:09.553082 systemd[1]: kubelet.service: Deactivated successfully.
Feb  9 19:28:09.553306 systemd[1]: Stopped kubelet.service.
Feb  9 19:28:09.556579 systemd[1]: Started kubelet.service.
Feb  9 19:28:09.684668 kubelet[2906]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 19:28:09.684668 kubelet[2906]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 19:28:09.685163 kubelet[2906]: I0209 19:28:09.684800    2906 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Feb  9 19:28:09.691584 kubelet[2906]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 19:28:09.691584 kubelet[2906]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 19:28:09.700830 kubelet[2906]: I0209 19:28:09.698292    2906 server.go:412] "Kubelet version" kubeletVersion="v1.26.5"
Feb  9 19:28:09.700830 kubelet[2906]: I0209 19:28:09.698323    2906 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Feb  9 19:28:09.700830 kubelet[2906]: I0209 19:28:09.698957    2906 server.go:836] "Client rotation is on, will bootstrap in background"
Feb  9 19:28:09.702998 kubelet[2906]: I0209 19:28:09.702105    2906 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem".
Feb  9 19:28:09.703595 kubelet[2906]: I0209 19:28:09.703575    2906 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Feb  9 19:28:09.713441 kubelet[2906]: I0209 19:28:09.711196    2906 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Feb  9 19:28:09.713441 kubelet[2906]: I0209 19:28:09.711484    2906 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Feb  9 19:28:09.713441 kubelet[2906]: I0209 19:28:09.711596    2906 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Feb  9 19:28:09.713441 kubelet[2906]: I0209 19:28:09.711631    2906 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Feb  9 19:28:09.713441 kubelet[2906]: I0209 19:28:09.711656    2906 container_manager_linux.go:308] "Creating device plugin manager"
Feb  9 19:28:09.713441 kubelet[2906]: I0209 19:28:09.711777    2906 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 19:28:09.721479 kubelet[2906]: I0209 19:28:09.721453    2906 kubelet.go:398] "Attempting to sync node with API server"
Feb  9 19:28:09.721706 kubelet[2906]: I0209 19:28:09.721672    2906 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests"
Feb  9 19:28:09.721835 kubelet[2906]: I0209 19:28:09.721823    2906 kubelet.go:297] "Adding apiserver pod source"
Feb  9 19:28:09.721940 kubelet[2906]: I0209 19:28:09.721929    2906 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Feb  9 19:28:09.723381 kubelet[2906]: I0209 19:28:09.723363    2906 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Feb  9 19:28:09.724026 kubelet[2906]: I0209 19:28:09.724009    2906 server.go:1186] "Started kubelet"
Feb  9 19:28:09.725000 audit[2906]: AVC avc:  denied  { mac_admin } for  pid=2906 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.725000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 19:28:09.725000 audit[2906]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000757cb0 a1=c000ad2d20 a2=c000757c80 a3=25 items=0 ppid=1 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:09.725000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 19:28:09.727199 kubelet[2906]: I0209 19:28:09.727184    2906 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Feb  9 19:28:09.726000 audit[2906]: AVC avc:  denied  { mac_admin } for  pid=2906 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.726000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 19:28:09.726000 audit[2906]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b08b80 a1=c000ad2d38 a2=c000757d40 a3=25 items=0 ppid=1 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:09.726000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 19:28:09.727550 kubelet[2906]: I0209 19:28:09.727539    2906 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Feb  9 19:28:09.727638 kubelet[2906]: I0209 19:28:09.727629    2906 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Feb  9 19:28:09.731342 kubelet[2906]: I0209 19:28:09.731323    2906 server.go:161] "Starting to listen" address="0.0.0.0" port=10250
Feb  9 19:28:09.732292 kubelet[2906]: I0209 19:28:09.732274    2906 server.go:451] "Adding debug handlers to kubelet server"
Feb  9 19:28:09.736447 kubelet[2906]: I0209 19:28:09.736425    2906 volume_manager.go:293] "Starting Kubelet Volume Manager"
Feb  9 19:28:09.740360 kubelet[2906]: I0209 19:28:09.740337    2906 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Feb  9 19:28:09.749467 kubelet[2906]: E0209 19:28:09.747298    2906 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Feb  9 19:28:09.749467 kubelet[2906]: E0209 19:28:09.747331    2906 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Feb  9 19:28:09.785198 kubelet[2906]: I0209 19:28:09.785174    2906 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Feb  9 19:28:09.811175 kubelet[2906]: I0209 19:28:09.811129    2906 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Feb  9 19:28:09.811175 kubelet[2906]: I0209 19:28:09.811154    2906 status_manager.go:176] "Starting to sync pod status with apiserver"
Feb  9 19:28:09.811175 kubelet[2906]: I0209 19:28:09.811175    2906 kubelet.go:2113] "Starting kubelet main sync loop"
Feb  9 19:28:09.811548 kubelet[2906]: E0209 19:28:09.811233    2906 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Feb  9 19:28:09.843371 kubelet[2906]: I0209 19:28:09.843345    2906 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-113"
Feb  9 19:28:09.862642 kubelet[2906]: I0209 19:28:09.862486    2906 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-21-113"
Feb  9 19:28:09.863431 kubelet[2906]: I0209 19:28:09.863290    2906 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-113"
Feb  9 19:28:09.891759 kubelet[2906]: I0209 19:28:09.891725    2906 cpu_manager.go:214] "Starting CPU manager" policy="none"
Feb  9 19:28:09.891759 kubelet[2906]: I0209 19:28:09.891750    2906 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Feb  9 19:28:09.891759 kubelet[2906]: I0209 19:28:09.891769    2906 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 19:28:09.892112 kubelet[2906]: I0209 19:28:09.892093    2906 state_mem.go:88] "Updated default CPUSet" cpuSet=""
Feb  9 19:28:09.892202 kubelet[2906]: I0209 19:28:09.892119    2906 state_mem.go:96] "Updated CPUSet assignments" assignments=map[]
Feb  9 19:28:09.892202 kubelet[2906]: I0209 19:28:09.892128    2906 policy_none.go:49] "None policy: Start"
Feb  9 19:28:09.892940 kubelet[2906]: I0209 19:28:09.892917    2906 memory_manager.go:169] "Starting memorymanager" policy="None"
Feb  9 19:28:09.893036 kubelet[2906]: I0209 19:28:09.892973    2906 state_mem.go:35] "Initializing new in-memory state store"
Feb  9 19:28:09.893339 kubelet[2906]: I0209 19:28:09.893320    2906 state_mem.go:75] "Updated machine memory state"
Feb  9 19:28:09.898574 kubelet[2906]: I0209 19:28:09.898545    2906 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Feb  9 19:28:09.897000 audit[2906]: AVC avc:  denied  { mac_admin } for  pid=2906 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:09.897000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 19:28:09.897000 audit[2906]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d4bbf0 a1=c00107ad38 a2=c000d4bbc0 a3=25 items=0 ppid=1 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:09.897000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 19:28:09.899078 kubelet[2906]: I0209 19:28:09.898617    2906 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Feb  9 19:28:09.899427 kubelet[2906]: I0209 19:28:09.899344    2906 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Feb  9 19:28:09.917808 kubelet[2906]: I0209 19:28:09.917777    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:09.918787 kubelet[2906]: I0209 19:28:09.917884    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:09.918787 kubelet[2906]: I0209 19:28:09.917926    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:10.041556 kubelet[2906]: I0209 19:28:10.041180    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:10.041556 kubelet[2906]: I0209 19:28:10.041278    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/82bb7db77ee4264d1cf076c84145e983-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-113\" (UID: \"82bb7db77ee4264d1cf076c84145e983\") " pod="kube-system/kube-scheduler-ip-172-31-21-113"
Feb  9 19:28:10.041556 kubelet[2906]: I0209 19:28:10.041331    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/de9e66061818337f4252227662efdea1-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-113\" (UID: \"de9e66061818337f4252227662efdea1\") " pod="kube-system/kube-apiserver-ip-172-31-21-113"
Feb  9 19:28:10.041556 kubelet[2906]: I0209 19:28:10.041365    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:10.041556 kubelet[2906]: I0209 19:28:10.041418    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:10.042012 kubelet[2906]: I0209 19:28:10.041467    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:10.042012 kubelet[2906]: I0209 19:28:10.041500    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/de9e66061818337f4252227662efdea1-ca-certs\") pod \"kube-apiserver-ip-172-31-21-113\" (UID: \"de9e66061818337f4252227662efdea1\") " pod="kube-system/kube-apiserver-ip-172-31-21-113"
Feb  9 19:28:10.042012 kubelet[2906]: I0209 19:28:10.041529    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/de9e66061818337f4252227662efdea1-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-113\" (UID: \"de9e66061818337f4252227662efdea1\") " pod="kube-system/kube-apiserver-ip-172-31-21-113"
Feb  9 19:28:10.042012 kubelet[2906]: I0209 19:28:10.041581    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/721ba73fc1631859cdb396ad904149ae-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-113\" (UID: \"721ba73fc1631859cdb396ad904149ae\") " pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:10.735211 kubelet[2906]: I0209 19:28:10.735164    2906 apiserver.go:52] "Watching apiserver"
Feb  9 19:28:10.747000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0
Feb  9 19:28:10.747000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000aff40 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:28:10.747000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:28:10.842947 kubelet[2906]: I0209 19:28:10.842904    2906 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Feb  9 19:28:10.848677 kubelet[2906]: I0209 19:28:10.848646    2906 reconciler.go:41] "Reconciler: start to sync state"
Feb  9 19:28:10.944525 kubelet[2906]: E0209 19:28:10.944495    2906 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-21-113\" already exists" pod="kube-system/kube-apiserver-ip-172-31-21-113"
Feb  9 19:28:11.329696 kubelet[2906]: E0209 19:28:11.329653    2906 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-21-113\" already exists" pod="kube-system/kube-scheduler-ip-172-31-21-113"
Feb  9 19:28:11.538348 kubelet[2906]: E0209 19:28:11.538293    2906 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-21-113\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-21-113"
Feb  9 19:28:11.863752 kubelet[2906]: I0209 19:28:11.863717    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-21-113" podStartSLOduration=2.862130372 pod.CreationTimestamp="2024-02-09 19:28:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:11.858901829 +0000 UTC m=+2.289898458" watchObservedRunningTime="2024-02-09 19:28:11.862130372 +0000 UTC m=+2.293126992"
Feb  9 19:28:12.553609 kubelet[2906]: I0209 19:28:12.553570    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-21-113" podStartSLOduration=3.55350146 pod.CreationTimestamp="2024-02-09 19:28:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:12.170396252 +0000 UTC m=+2.601392884" watchObservedRunningTime="2024-02-09 19:28:12.55350146 +0000 UTC m=+2.984498090"
Feb  9 19:28:12.553865 kubelet[2906]: I0209 19:28:12.553720    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-21-113" podStartSLOduration=3.553678385 pod.CreationTimestamp="2024-02-09 19:28:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:12.549416644 +0000 UTC m=+2.980413273" watchObservedRunningTime="2024-02-09 19:28:12.553678385 +0000 UTC m=+2.984675014"
Feb  9 19:28:16.514509 sudo[1841]: pam_unix(sudo:session): session closed for user root
Feb  9 19:28:16.514000 audit[1841]: USER_END pid=1841 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:28:16.517825 kernel: kauditd_printk_skb: 263 callbacks suppressed
Feb  9 19:28:16.517963 kernel: audit: type=1106 audit(1707506896.514:1020): pid=1841 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:28:16.515000 audit[1841]: CRED_DISP pid=1841 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:28:16.531816 kernel: audit: type=1104 audit(1707506896.515:1021): pid=1841 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 19:28:16.556149 sshd[1838]: pam_unix(sshd:session): session closed for user core
Feb  9 19:28:16.559000 audit[1838]: USER_END pid=1838 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:28:16.559000 audit[1838]: CRED_DISP pid=1838 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:28:16.568521 systemd[1]: sshd@6-172.31.21.113:22-139.178.68.195:57098.service: Deactivated successfully.
Feb  9 19:28:16.569468 systemd[1]: session-7.scope: Deactivated successfully.
Feb  9 19:28:16.569717 systemd[1]: session-7.scope: Consumed 4.407s CPU time.
Feb  9 19:28:16.572284 kernel: audit: type=1106 audit(1707506896.559:1022): pid=1838 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:28:16.572370 kernel: audit: type=1104 audit(1707506896.559:1023): pid=1838 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:28:16.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.113:22-139.178.68.195:57098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:28:16.572945 systemd-logind[1552]: Session 7 logged out. Waiting for processes to exit.
Feb  9 19:28:16.574804 systemd-logind[1552]: Removed session 7.
Feb  9 19:28:16.577984 kernel: audit: type=1131 audit(1707506896.568:1024): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.113:22-139.178.68.195:57098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:28:22.174823 kubelet[2906]: I0209 19:28:22.174789    2906 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24"
Feb  9 19:28:22.175574 env[1569]: time="2024-02-09T19:28:22.175529287Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Feb  9 19:28:22.175949 kubelet[2906]: I0209 19:28:22.175780    2906 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24"
Feb  9 19:28:22.578339 kubelet[2906]: I0209 19:28:22.578296    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:22.588236 systemd[1]: Created slice kubepods-besteffort-pod769922d9_fc9b_49d5_9651_8e9706cdfc05.slice.
Feb  9 19:28:22.732892 kubelet[2906]: I0209 19:28:22.732849    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/769922d9-fc9b-49d5-9651-8e9706cdfc05-kube-proxy\") pod \"kube-proxy-c2v9c\" (UID: \"769922d9-fc9b-49d5-9651-8e9706cdfc05\") " pod="kube-system/kube-proxy-c2v9c"
Feb  9 19:28:22.732892 kubelet[2906]: I0209 19:28:22.732910    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/769922d9-fc9b-49d5-9651-8e9706cdfc05-lib-modules\") pod \"kube-proxy-c2v9c\" (UID: \"769922d9-fc9b-49d5-9651-8e9706cdfc05\") " pod="kube-system/kube-proxy-c2v9c"
Feb  9 19:28:22.733135 kubelet[2906]: I0209 19:28:22.732941    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7cdf7\" (UniqueName: \"kubernetes.io/projected/769922d9-fc9b-49d5-9651-8e9706cdfc05-kube-api-access-7cdf7\") pod \"kube-proxy-c2v9c\" (UID: \"769922d9-fc9b-49d5-9651-8e9706cdfc05\") " pod="kube-system/kube-proxy-c2v9c"
Feb  9 19:28:22.733135 kubelet[2906]: I0209 19:28:22.732969    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/769922d9-fc9b-49d5-9651-8e9706cdfc05-xtables-lock\") pod \"kube-proxy-c2v9c\" (UID: \"769922d9-fc9b-49d5-9651-8e9706cdfc05\") " pod="kube-system/kube-proxy-c2v9c"
Feb  9 19:28:22.852220 kubelet[2906]: E0209 19:28:22.852107    2906 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found
Feb  9 19:28:22.852220 kubelet[2906]: E0209 19:28:22.852158    2906 projected.go:198] Error preparing data for projected volume kube-api-access-7cdf7 for pod kube-system/kube-proxy-c2v9c: configmap "kube-root-ca.crt" not found
Feb  9 19:28:22.852443 kubelet[2906]: E0209 19:28:22.852284    2906 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/769922d9-fc9b-49d5-9651-8e9706cdfc05-kube-api-access-7cdf7 podName:769922d9-fc9b-49d5-9651-8e9706cdfc05 nodeName:}" failed. No retries permitted until 2024-02-09 19:28:23.352236541 +0000 UTC m=+13.783233146 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-7cdf7" (UniqueName: "kubernetes.io/projected/769922d9-fc9b-49d5-9651-8e9706cdfc05-kube-api-access-7cdf7") pod "kube-proxy-c2v9c" (UID: "769922d9-fc9b-49d5-9651-8e9706cdfc05") : configmap "kube-root-ca.crt" not found
Feb  9 19:28:23.107552 kubelet[2906]: I0209 19:28:23.107439    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:23.119999 systemd[1]: Created slice kubepods-besteffort-podc7d612b1_15e4_43f6_b77c_89cf48ba0e17.slice.
Feb  9 19:28:23.235735 kubelet[2906]: I0209 19:28:23.235676    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n26hm\" (UniqueName: \"kubernetes.io/projected/c7d612b1-15e4-43f6-b77c-89cf48ba0e17-kube-api-access-n26hm\") pod \"tigera-operator-cfc98749c-z9wz7\" (UID: \"c7d612b1-15e4-43f6-b77c-89cf48ba0e17\") " pod="tigera-operator/tigera-operator-cfc98749c-z9wz7"
Feb  9 19:28:23.236387 kubelet[2906]: I0209 19:28:23.236043    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c7d612b1-15e4-43f6-b77c-89cf48ba0e17-var-lib-calico\") pod \"tigera-operator-cfc98749c-z9wz7\" (UID: \"c7d612b1-15e4-43f6-b77c-89cf48ba0e17\") " pod="tigera-operator/tigera-operator-cfc98749c-z9wz7"
Feb  9 19:28:23.429333 env[1569]: time="2024-02-09T19:28:23.428809697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-z9wz7,Uid:c7d612b1-15e4-43f6-b77c-89cf48ba0e17,Namespace:tigera-operator,Attempt:0,}"
Feb  9 19:28:23.466991 env[1569]: time="2024-02-09T19:28:23.466911002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:28:23.466991 env[1569]: time="2024-02-09T19:28:23.466955434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:28:23.466991 env[1569]: time="2024-02-09T19:28:23.466971946Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:28:23.467485 env[1569]: time="2024-02-09T19:28:23.467432469Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e2f910e1a8668111b5104e27986996a75e7d9f46c8749ea7a345623377cb4236 pid=3016 runtime=io.containerd.runc.v2
Feb  9 19:28:23.494398 systemd[1]: Started cri-containerd-e2f910e1a8668111b5104e27986996a75e7d9f46c8749ea7a345623377cb4236.scope.
Feb  9 19:28:23.505316 env[1569]: time="2024-02-09T19:28:23.505243299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-c2v9c,Uid:769922d9-fc9b-49d5-9651-8e9706cdfc05,Namespace:kube-system,Attempt:0,}"
Feb  9 19:28:23.524786 kernel: audit: type=1400 audit(1707506903.513:1025): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.525058 kernel: audit: type=1400 audit(1707506903.513:1026): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.513000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.513000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.513000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.530780 kernel: audit: type=1400 audit(1707506903.513:1027): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.598914 kernel: audit: type=1400 audit(1707506903.513:1028): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.599005 kernel: audit: type=1400 audit(1707506903.513:1029): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.599025 kernel: audit: type=1400 audit(1707506903.513:1030): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.599044 kernel: audit: type=1400 audit(1707506903.513:1031): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.599093 kernel: audit: type=1400 audit(1707506903.513:1032): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.599111 kernel: audit: type=1400 audit(1707506903.513:1033): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.599133 kernel: audit: type=1400 audit(1707506903.518:1034): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.513000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.513000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.513000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.513000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.513000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.513000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.518000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.518000 audit: BPF prog-id=118 op=LOAD
Feb  9 19:28:23.519000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.519000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663931306531613836363831313162353130346532373938363939
Feb  9 19:28:23.519000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.519000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663931306531613836363831313162353130346532373938363939
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.520000 audit: BPF prog-id=119 op=LOAD
Feb  9 19:28:23.520000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d7040 items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663931306531613836363831313162353130346532373938363939
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit: BPF prog-id=120 op=LOAD
Feb  9 19:28:23.524000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d7088 items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663931306531613836363831313162353130346532373938363939
Feb  9 19:28:23.524000 audit: BPF prog-id=120 op=UNLOAD
Feb  9 19:28:23.524000 audit: BPF prog-id=119 op=UNLOAD
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { perfmon } for  pid=3026 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit[3026]: AVC avc:  denied  { bpf } for  pid=3026 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.524000 audit: BPF prog-id=121 op=LOAD
Feb  9 19:28:23.524000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d7498 items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663931306531613836363831313162353130346532373938363939
Feb  9 19:28:23.601148 env[1569]: time="2024-02-09T19:28:23.587173527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-z9wz7,Uid:c7d612b1-15e4-43f6-b77c-89cf48ba0e17,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e2f910e1a8668111b5104e27986996a75e7d9f46c8749ea7a345623377cb4236\""
Feb  9 19:28:23.601148 env[1569]: time="2024-02-09T19:28:23.590176674Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\""
Feb  9 19:28:23.623517 env[1569]: time="2024-02-09T19:28:23.623219662Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:28:23.623517 env[1569]: time="2024-02-09T19:28:23.623271496Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:28:23.623517 env[1569]: time="2024-02-09T19:28:23.623282962Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:28:23.624018 env[1569]: time="2024-02-09T19:28:23.623614786Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8af7011e7a2b5da8722e74ef9e9c7651d03b696b5905aaaea273116ecad3275e pid=3060 runtime=io.containerd.runc.v2
Feb  9 19:28:23.641890 systemd[1]: Started cri-containerd-8af7011e7a2b5da8722e74ef9e9c7651d03b696b5905aaaea273116ecad3275e.scope.
Feb  9 19:28:23.663000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.663000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.663000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.663000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.663000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.663000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.663000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.663000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.663000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.664000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.664000 audit: BPF prog-id=122 op=LOAD
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3060 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663730313165376132623564613837323265373465663965396337
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3060 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663730313165376132623564613837323265373465663965396337
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit: BPF prog-id=123 op=LOAD
Feb  9 19:28:23.665000 audit[3071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002673d0 items=0 ppid=3060 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663730313165376132623564613837323265373465663965396337
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit: BPF prog-id=124 op=LOAD
Feb  9 19:28:23.665000 audit[3071]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000267418 items=0 ppid=3060 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663730313165376132623564613837323265373465663965396337
Feb  9 19:28:23.665000 audit: BPF prog-id=124 op=UNLOAD
Feb  9 19:28:23.665000 audit: BPF prog-id=123 op=UNLOAD
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { perfmon } for  pid=3071 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit[3071]: AVC avc:  denied  { bpf } for  pid=3071 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.665000 audit: BPF prog-id=125 op=LOAD
Feb  9 19:28:23.665000 audit[3071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000267828 items=0 ppid=3060 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663730313165376132623564613837323265373465663965396337
Feb  9 19:28:23.704805 env[1569]: time="2024-02-09T19:28:23.703097138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-c2v9c,Uid:769922d9-fc9b-49d5-9651-8e9706cdfc05,Namespace:kube-system,Attempt:0,} returns sandbox id \"8af7011e7a2b5da8722e74ef9e9c7651d03b696b5905aaaea273116ecad3275e\""
Feb  9 19:28:23.732849 env[1569]: time="2024-02-09T19:28:23.732722588Z" level=info msg="CreateContainer within sandbox \"8af7011e7a2b5da8722e74ef9e9c7651d03b696b5905aaaea273116ecad3275e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Feb  9 19:28:23.763917 env[1569]: time="2024-02-09T19:28:23.763875022Z" level=info msg="CreateContainer within sandbox \"8af7011e7a2b5da8722e74ef9e9c7651d03b696b5905aaaea273116ecad3275e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bb182363e2930b40ffe1ef9558d4c9ae9b6803cc661ebd94d2759ca0acb50673\""
Feb  9 19:28:23.765008 env[1569]: time="2024-02-09T19:28:23.764973269Z" level=info msg="StartContainer for \"bb182363e2930b40ffe1ef9558d4c9ae9b6803cc661ebd94d2759ca0acb50673\""
Feb  9 19:28:23.789163 systemd[1]: Started cri-containerd-bb182363e2930b40ffe1ef9558d4c9ae9b6803cc661ebd94d2759ca0acb50673.scope.
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3060 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313832333633653239333062343066666531656639353538643463
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit: BPF prog-id=126 op=LOAD
Feb  9 19:28:23.813000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003de160 items=0 ppid=3060 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313832333633653239333062343066666531656639353538643463
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit: BPF prog-id=127 op=LOAD
Feb  9 19:28:23.813000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003de1a8 items=0 ppid=3060 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313832333633653239333062343066666531656639353538643463
Feb  9 19:28:23.813000 audit: BPF prog-id=127 op=UNLOAD
Feb  9 19:28:23.813000 audit: BPF prog-id=126 op=UNLOAD
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { perfmon } for  pid=3106 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit[3106]: AVC avc:  denied  { bpf } for  pid=3106 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:23.813000 audit: BPF prog-id=128 op=LOAD
Feb  9 19:28:23.813000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003de238 items=0 ppid=3060 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:23.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313832333633653239333062343066666531656639353538643463
Feb  9 19:28:23.838455 env[1569]: time="2024-02-09T19:28:23.838415052Z" level=info msg="StartContainer for \"bb182363e2930b40ffe1ef9558d4c9ae9b6803cc661ebd94d2759ca0acb50673\" returns successfully"
Feb  9 19:28:23.907799 kubelet[2906]: I0209 19:28:23.907753    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-c2v9c" podStartSLOduration=1.90770474 pod.CreationTimestamp="2024-02-09 19:28:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:23.907325764 +0000 UTC m=+14.338322386" watchObservedRunningTime="2024-02-09 19:28:23.90770474 +0000 UTC m=+14.338701367"
Feb  9 19:28:24.331000 audit[3155]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=3155 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.331000 audit[3155]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe646b9540 a2=0 a3=7ffe646b952c items=0 ppid=3117 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.331000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Feb  9 19:28:24.334000 audit[3156]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_chain pid=3156 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.334000 audit[3156]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3e4d2a90 a2=0 a3=7ffc3e4d2a7c items=0 ppid=3117 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Feb  9 19:28:24.337000 audit[3157]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_chain pid=3157 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.337000 audit[3157]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff59339000 a2=0 a3=7fff59338fec items=0 ppid=3117 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.337000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Feb  9 19:28:24.340000 audit[3158]: NETFILTER_CFG table=mangle:62 family=10 entries=1 op=nft_register_chain pid=3158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.340000 audit[3158]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb8a280b0 a2=0 a3=7fffb8a2809c items=0 ppid=3117 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Feb  9 19:28:24.341000 audit[3159]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=3159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.341000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff26b8f580 a2=0 a3=7fff26b8f56c items=0 ppid=3117 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Feb  9 19:28:24.343000 audit[3160]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=3160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.343000 audit[3160]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc82411880 a2=0 a3=7ffc8241186c items=0 ppid=3117 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Feb  9 19:28:24.448000 audit[3161]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=3161 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.448000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc824220e0 a2=0 a3=7ffc824220cc items=0 ppid=3117 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Feb  9 19:28:24.453000 audit[3163]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.453000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc4d072630 a2=0 a3=7ffc4d07261c items=0 ppid=3117 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Feb  9 19:28:24.459000 audit[3166]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=3166 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.459000 audit[3166]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff07d0c0d0 a2=0 a3=7fff07d0c0bc items=0 ppid=3117 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Feb  9 19:28:24.460000 audit[3167]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.460000 audit[3167]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2ae766b0 a2=0 a3=7ffe2ae7669c items=0 ppid=3117 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Feb  9 19:28:24.465000 audit[3169]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=3169 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.465000 audit[3169]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff997beb70 a2=0 a3=7fff997beb5c items=0 ppid=3117 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Feb  9 19:28:24.467000 audit[3170]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=3170 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.467000 audit[3170]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7e7564a0 a2=0 a3=7ffd7e75648c items=0 ppid=3117 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Feb  9 19:28:24.472000 audit[3172]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=3172 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.472000 audit[3172]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd1b9262d0 a2=0 a3=7ffd1b9262bc items=0 ppid=3117 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Feb  9 19:28:24.476000 audit[3175]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.476000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc25097f60 a2=0 a3=7ffc25097f4c items=0 ppid=3117 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Feb  9 19:28:24.481000 audit[3176]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=3176 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.481000 audit[3176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4124ac50 a2=0 a3=7ffd4124ac3c items=0 ppid=3117 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Feb  9 19:28:24.485000 audit[3178]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=3178 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.485000 audit[3178]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff09dcd4f0 a2=0 a3=7fff09dcd4dc items=0 ppid=3117 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Feb  9 19:28:24.487000 audit[3179]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.487000 audit[3179]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf2bcb9c0 a2=0 a3=7ffcf2bcb9ac items=0 ppid=3117 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Feb  9 19:28:24.492000 audit[3181]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=3181 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.492000 audit[3181]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2877aac0 a2=0 a3=7ffe2877aaac items=0 ppid=3117 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Feb  9 19:28:24.497000 audit[3185]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.497000 audit[3185]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc74e02370 a2=0 a3=7ffc74e0235c items=0 ppid=3117 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Feb  9 19:28:24.502000 audit[3188]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=3188 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.502000 audit[3188]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3170a550 a2=0 a3=7ffc3170a53c items=0 ppid=3117 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Feb  9 19:28:24.503000 audit[3189]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=3189 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.503000 audit[3189]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc4d963b00 a2=0 a3=7ffc4d963aec items=0 ppid=3117 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Feb  9 19:28:24.507000 audit[3191]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=3191 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.507000 audit[3191]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff20f70d30 a2=0 a3=7fff20f70d1c items=0 ppid=3117 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 19:28:24.527000 audit[3194]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=3194 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 19:28:24.527000 audit[3194]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2f4d2d50 a2=0 a3=7fff2f4d2d3c items=0 ppid=3117 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 19:28:24.591000 audit[3198]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=3198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:24.591000 audit[3198]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffe4cc510d0 a2=0 a3=7ffe4cc510bc items=0 ppid=3117 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:24.603000 audit[3198]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=3198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:24.603000 audit[3198]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe4cc510d0 a2=0 a3=7ffe4cc510bc items=0 ppid=3117 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:24.605000 audit[3203]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.605000 audit[3203]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff4eb3bd40 a2=0 a3=7fff4eb3bd2c items=0 ppid=3117 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Feb  9 19:28:24.609000 audit[3205]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.609000 audit[3205]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff9d0c8eb0 a2=0 a3=7fff9d0c8e9c items=0 ppid=3117 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Feb  9 19:28:24.624000 audit[3208]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.624000 audit[3208]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcef80ada0 a2=0 a3=7ffcef80ad8c items=0 ppid=3117 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Feb  9 19:28:24.626000 audit[3209]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.626000 audit[3209]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe47411e00 a2=0 a3=7ffe47411dec items=0 ppid=3117 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Feb  9 19:28:24.629000 audit[3211]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.629000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb3fd7cc0 a2=0 a3=7ffdb3fd7cac items=0 ppid=3117 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Feb  9 19:28:24.631000 audit[3212]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.631000 audit[3212]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8b2f7160 a2=0 a3=7ffc8b2f714c items=0 ppid=3117 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Feb  9 19:28:24.636000 audit[3214]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.636000 audit[3214]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc18aec4f0 a2=0 a3=7ffc18aec4dc items=0 ppid=3117 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Feb  9 19:28:24.641000 audit[3217]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.641000 audit[3217]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc9c921cd0 a2=0 a3=7ffc9c921cbc items=0 ppid=3117 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Feb  9 19:28:24.642000 audit[3218]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.642000 audit[3218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff32ac73c0 a2=0 a3=7fff32ac73ac items=0 ppid=3117 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Feb  9 19:28:24.646000 audit[3220]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.646000 audit[3220]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffefb14ff0 a2=0 a3=7fffefb14fdc items=0 ppid=3117 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Feb  9 19:28:24.647000 audit[3221]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.647000 audit[3221]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd67adec50 a2=0 a3=7ffd67adec3c items=0 ppid=3117 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Feb  9 19:28:24.651000 audit[3223]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.651000 audit[3223]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb5131070 a2=0 a3=7fffb513105c items=0 ppid=3117 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Feb  9 19:28:24.658000 audit[3226]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.658000 audit[3226]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd8311f40 a2=0 a3=7ffdd8311f2c items=0 ppid=3117 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Feb  9 19:28:24.664000 audit[3229]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.664000 audit[3229]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbec05800 a2=0 a3=7fffbec057ec items=0 ppid=3117 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Feb  9 19:28:24.665000 audit[3230]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.665000 audit[3230]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffaf4754e0 a2=0 a3=7fffaf4754cc items=0 ppid=3117 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Feb  9 19:28:24.668000 audit[3232]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.668000 audit[3232]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff763a40a0 a2=0 a3=7fff763a408c items=0 ppid=3117 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 19:28:24.673000 audit[3235]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 19:28:24.673000 audit[3235]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe476bc080 a2=0 a3=7ffe476bc06c items=0 ppid=3117 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 19:28:24.682000 audit[3239]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Feb  9 19:28:24.682000 audit[3239]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd6d045770 a2=0 a3=7ffd6d04575c items=0 ppid=3117 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.682000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:24.682000 audit[3239]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Feb  9 19:28:24.682000 audit[3239]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd6d045770 a2=0 a3=7ffd6d04575c items=0 ppid=3117 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:24.682000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:25.183676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2278986895.mount: Deactivated successfully.
Feb  9 19:28:27.780581 env[1569]: time="2024-02-09T19:28:27.780414718Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:27.932104 env[1569]: time="2024-02-09T19:28:27.932056614Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:27.981362 env[1569]: time="2024-02-09T19:28:27.981301210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:27.990945 env[1569]: time="2024-02-09T19:28:27.990889645Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\""
Feb  9 19:28:27.992208 env[1569]: time="2024-02-09T19:28:27.992176873Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:27.996352 env[1569]: time="2024-02-09T19:28:27.996266603Z" level=info msg="CreateContainer within sandbox \"e2f910e1a8668111b5104e27986996a75e7d9f46c8749ea7a345623377cb4236\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}"
Feb  9 19:28:28.044888 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2806704721.mount: Deactivated successfully.
Feb  9 19:28:28.052096 env[1569]: time="2024-02-09T19:28:28.052016858Z" level=info msg="CreateContainer within sandbox \"e2f910e1a8668111b5104e27986996a75e7d9f46c8749ea7a345623377cb4236\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92\""
Feb  9 19:28:28.053495 env[1569]: time="2024-02-09T19:28:28.053404229Z" level=info msg="StartContainer for \"fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92\""
Feb  9 19:28:28.122765 systemd[1]: Started cri-containerd-fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92.scope.
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.142000 audit: BPF prog-id=129 op=LOAD
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3016 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:28.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661646135666532626365393461646361666166306131303435633933
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3016 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:28.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661646135666532626365393461646361666166306131303435633933
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.143000 audit: BPF prog-id=130 op=LOAD
Feb  9 19:28:28.143000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c0090 items=0 ppid=3016 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:28.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661646135666532626365393461646361666166306131303435633933
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit: BPF prog-id=131 op=LOAD
Feb  9 19:28:28.144000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c00d8 items=0 ppid=3016 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:28.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661646135666532626365393461646361666166306131303435633933
Feb  9 19:28:28.144000 audit: BPF prog-id=131 op=UNLOAD
Feb  9 19:28:28.144000 audit: BPF prog-id=130 op=UNLOAD
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:28.144000 audit: BPF prog-id=132 op=LOAD
Feb  9 19:28:28.144000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c04e8 items=0 ppid=3016 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:28.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661646135666532626365393461646361666166306131303435633933
Feb  9 19:28:28.230914 env[1569]: time="2024-02-09T19:28:28.230875769Z" level=info msg="StartContainer for \"fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92\" returns successfully"
Feb  9 19:28:29.018413 systemd[1]: run-containerd-runc-k8s.io-fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92-runc.QLOlYM.mount: Deactivated successfully.
Feb  9 19:28:30.352000 audit[3305]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:30.355014 kernel: kauditd_printk_skb: 336 callbacks suppressed
Feb  9 19:28:30.355120 kernel: audit: type=1325 audit(1707506910.352:1129): table=filter:103 family=2 entries=13 op=nft_register_rule pid=3305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:30.352000 audit[3305]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffc37653c90 a2=0 a3=7ffc37653c7c items=0 ppid=3117 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.366158 kernel: audit: type=1300 audit(1707506910.352:1129): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffc37653c90 a2=0 a3=7ffc37653c7c items=0 ppid=3117 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.366309 kernel: audit: type=1327 audit(1707506910.352:1129): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:30.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:30.353000 audit[3305]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:30.389564 kernel: audit: type=1325 audit(1707506910.353:1130): table=nat:104 family=2 entries=20 op=nft_register_rule pid=3305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:30.389715 kernel: audit: type=1300 audit(1707506910.353:1130): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc37653c90 a2=0 a3=7ffc37653c7c items=0 ppid=3117 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.353000 audit[3305]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc37653c90 a2=0 a3=7ffc37653c7c items=0 ppid=3117 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:30.396249 kernel: audit: type=1327 audit(1707506910.353:1130): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:30.467390 kubelet[2906]: I0209 19:28:30.467338    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-z9wz7" podStartSLOduration=-9.223372029387728e+09 pod.CreationTimestamp="2024-02-09 19:28:23 +0000 UTC" firstStartedPulling="2024-02-09 19:28:23.588535315 +0000 UTC m=+14.019531923" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:28.925116134 +0000 UTC m=+19.356112758" watchObservedRunningTime="2024-02-09 19:28:30.467048047 +0000 UTC m=+20.898044675"
Feb  9 19:28:30.468150 kubelet[2906]: I0209 19:28:30.467647    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:30.475675 systemd[1]: Created slice kubepods-besteffort-pod32ae8c94_8198_4d25_bbc1_32300e059a01.slice.
Feb  9 19:28:30.507121 kubelet[2906]: I0209 19:28:30.507087    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/32ae8c94-8198-4d25-bbc1-32300e059a01-tigera-ca-bundle\") pod \"calico-typha-65cd596556-q457s\" (UID: \"32ae8c94-8198-4d25-bbc1-32300e059a01\") " pod="calico-system/calico-typha-65cd596556-q457s"
Feb  9 19:28:30.507375 kubelet[2906]: I0209 19:28:30.507143    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tlrgg\" (UniqueName: \"kubernetes.io/projected/32ae8c94-8198-4d25-bbc1-32300e059a01-kube-api-access-tlrgg\") pod \"calico-typha-65cd596556-q457s\" (UID: \"32ae8c94-8198-4d25-bbc1-32300e059a01\") " pod="calico-system/calico-typha-65cd596556-q457s"
Feb  9 19:28:30.507375 kubelet[2906]: I0209 19:28:30.507177    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/32ae8c94-8198-4d25-bbc1-32300e059a01-typha-certs\") pod \"calico-typha-65cd596556-q457s\" (UID: \"32ae8c94-8198-4d25-bbc1-32300e059a01\") " pod="calico-system/calico-typha-65cd596556-q457s"
Feb  9 19:28:30.632000 audit[3331]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:30.639181 kernel: audit: type=1325 audit(1707506910.632:1131): table=filter:105 family=2 entries=14 op=nft_register_rule pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:30.632000 audit[3331]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffcb297a8c0 a2=0 a3=7ffcb297a8ac items=0 ppid=3117 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.650943 kernel: audit: type=1300 audit(1707506910.632:1131): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffcb297a8c0 a2=0 a3=7ffcb297a8ac items=0 ppid=3117 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:30.657949 kernel: audit: type=1327 audit(1707506910.632:1131): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:30.651000 audit[3331]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:30.664705 kernel: audit: type=1325 audit(1707506910.651:1132): table=nat:106 family=2 entries=20 op=nft_register_rule pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:30.651000 audit[3331]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcb297a8c0 a2=0 a3=7ffcb297a8ac items=0 ppid=3117 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:30.679871 kubelet[2906]: I0209 19:28:30.679834    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:30.688610 systemd[1]: Created slice kubepods-besteffort-podaf6b02d1_d5b1_4499_9206_b923046863e7.slice.
Feb  9 19:28:30.692132 kubelet[2906]: W0209 19:28:30.692101    2906 reflector.go:424] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ip-172-31-21-113" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-113' and this object
Feb  9 19:28:30.692275 kubelet[2906]: E0209 19:28:30.692150    2906 reflector.go:140] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ip-172-31-21-113" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-113' and this object
Feb  9 19:28:30.692275 kubelet[2906]: W0209 19:28:30.692212    2906 reflector.go:424] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ip-172-31-21-113" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-113' and this object
Feb  9 19:28:30.692275 kubelet[2906]: E0209 19:28:30.692225    2906 reflector.go:140] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ip-172-31-21-113" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-113' and this object
Feb  9 19:28:30.789531 env[1569]: time="2024-02-09T19:28:30.789445756Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-65cd596556-q457s,Uid:32ae8c94-8198-4d25-bbc1-32300e059a01,Namespace:calico-system,Attempt:0,}"
Feb  9 19:28:30.815703 kubelet[2906]: I0209 19:28:30.813560    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/af6b02d1-d5b1-4499-9206-b923046863e7-var-run-calico\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.815703 kubelet[2906]: I0209 19:28:30.813613    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/af6b02d1-d5b1-4499-9206-b923046863e7-node-certs\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.815703 kubelet[2906]: I0209 19:28:30.813645    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/af6b02d1-d5b1-4499-9206-b923046863e7-cni-net-dir\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.815703 kubelet[2906]: I0209 19:28:30.813678    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/af6b02d1-d5b1-4499-9206-b923046863e7-cni-log-dir\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.815703 kubelet[2906]: I0209 19:28:30.813867    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/af6b02d1-d5b1-4499-9206-b923046863e7-tigera-ca-bundle\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.816146 kubelet[2906]: I0209 19:28:30.813918    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/af6b02d1-d5b1-4499-9206-b923046863e7-cni-bin-dir\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.816146 kubelet[2906]: I0209 19:28:30.813955    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/af6b02d1-d5b1-4499-9206-b923046863e7-xtables-lock\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.816146 kubelet[2906]: I0209 19:28:30.813988    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/af6b02d1-d5b1-4499-9206-b923046863e7-lib-modules\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.816146 kubelet[2906]: I0209 19:28:30.814022    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/af6b02d1-d5b1-4499-9206-b923046863e7-var-lib-calico\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.816146 kubelet[2906]: I0209 19:28:30.814063    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/af6b02d1-d5b1-4499-9206-b923046863e7-policysync\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.816345 kubelet[2906]: I0209 19:28:30.814120    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/af6b02d1-d5b1-4499-9206-b923046863e7-flexvol-driver-host\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.816345 kubelet[2906]: I0209 19:28:30.814161    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8wr5w\" (UniqueName: \"kubernetes.io/projected/af6b02d1-d5b1-4499-9206-b923046863e7-kube-api-access-8wr5w\") pod \"calico-node-tqrtl\" (UID: \"af6b02d1-d5b1-4499-9206-b923046863e7\") " pod="calico-system/calico-node-tqrtl"
Feb  9 19:28:30.821629 env[1569]: time="2024-02-09T19:28:30.821523916Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:28:30.821629 env[1569]: time="2024-02-09T19:28:30.821590173Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:28:30.821875 env[1569]: time="2024-02-09T19:28:30.821622576Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:28:30.821946 env[1569]: time="2024-02-09T19:28:30.821834622Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/afde5fb1f7b0a3448c5792f35048f1ea3a7a0d32518963168a9058f47e14ff53 pid=3340 runtime=io.containerd.runc.v2
Feb  9 19:28:30.855740 systemd[1]: Started cri-containerd-afde5fb1f7b0a3448c5792f35048f1ea3a7a0d32518963168a9058f47e14ff53.scope.
Feb  9 19:28:30.884549 kubelet[2906]: I0209 19:28:30.883834    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:30.884549 kubelet[2906]: E0209 19:28:30.884197    2906 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:30.915313 kubelet[2906]: I0209 19:28:30.915203    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1-registration-dir\") pod \"csi-node-driver-swjtr\" (UID: \"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1\") " pod="calico-system/csi-node-driver-swjtr"
Feb  9 19:28:30.915657 kubelet[2906]: I0209 19:28:30.915639    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1-socket-dir\") pod \"csi-node-driver-swjtr\" (UID: \"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1\") " pod="calico-system/csi-node-driver-swjtr"
Feb  9 19:28:30.915859 kubelet[2906]: I0209 19:28:30.915839    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6zmkj\" (UniqueName: \"kubernetes.io/projected/cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1-kube-api-access-6zmkj\") pod \"csi-node-driver-swjtr\" (UID: \"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1\") " pod="calico-system/csi-node-driver-swjtr"
Feb  9 19:28:30.916013 kubelet[2906]: I0209 19:28:30.915995    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1-varrun\") pod \"csi-node-driver-swjtr\" (UID: \"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1\") " pod="calico-system/csi-node-driver-swjtr"
Feb  9 19:28:30.916239 kubelet[2906]: I0209 19:28:30.916228    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1-kubelet-dir\") pod \"csi-node-driver-swjtr\" (UID: \"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1\") " pod="calico-system/csi-node-driver-swjtr"
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.950000 audit: BPF prog-id=133 op=LOAD
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3340 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166646535666231663762306133343438633537393266333530343866
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3340 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166646535666231663762306133343438633537393266333530343866
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit: BPF prog-id=134 op=LOAD
Feb  9 19:28:30.952000 audit[3349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003c2db0 items=0 ppid=3340 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166646535666231663762306133343438633537393266333530343866
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit: BPF prog-id=135 op=LOAD
Feb  9 19:28:30.952000 audit[3349]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003c2df8 items=0 ppid=3340 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166646535666231663762306133343438633537393266333530343866
Feb  9 19:28:30.952000 audit: BPF prog-id=135 op=UNLOAD
Feb  9 19:28:30.952000 audit: BPF prog-id=134 op=UNLOAD
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { perfmon } for  pid=3349 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit[3349]: AVC avc:  denied  { bpf } for  pid=3349 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:30.952000 audit: BPF prog-id=136 op=LOAD
Feb  9 19:28:30.952000 audit[3349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c3208 items=0 ppid=3340 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:30.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166646535666231663762306133343438633537393266333530343866
Feb  9 19:28:31.010635 env[1569]: time="2024-02-09T19:28:31.010579114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-65cd596556-q457s,Uid:32ae8c94-8198-4d25-bbc1-32300e059a01,Namespace:calico-system,Attempt:0,} returns sandbox id \"afde5fb1f7b0a3448c5792f35048f1ea3a7a0d32518963168a9058f47e14ff53\""
Feb  9 19:28:31.013367 env[1569]: time="2024-02-09T19:28:31.013331450Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\""
Feb  9 19:28:31.017042 kubelet[2906]: E0209 19:28:31.016860    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.017042 kubelet[2906]: W0209 19:28:31.016879    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.017042 kubelet[2906]: E0209 19:28:31.016905    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.017476 kubelet[2906]: E0209 19:28:31.017341    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.017476 kubelet[2906]: W0209 19:28:31.017363    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.017476 kubelet[2906]: E0209 19:28:31.017378    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.019282 kubelet[2906]: E0209 19:28:31.017714    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.019282 kubelet[2906]: W0209 19:28:31.017729    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.019282 kubelet[2906]: E0209 19:28:31.017749    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.019282 kubelet[2906]: E0209 19:28:31.018284    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.019282 kubelet[2906]: W0209 19:28:31.018295    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.019282 kubelet[2906]: E0209 19:28:31.018315    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.019282 kubelet[2906]: E0209 19:28:31.018564    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.019282 kubelet[2906]: W0209 19:28:31.018574    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.019282 kubelet[2906]: E0209 19:28:31.018592    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.019282 kubelet[2906]: E0209 19:28:31.018828    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.019671 kubelet[2906]: W0209 19:28:31.018838    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.019671 kubelet[2906]: E0209 19:28:31.018867    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.019671 kubelet[2906]: E0209 19:28:31.019142    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.019671 kubelet[2906]: W0209 19:28:31.019152    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.019671 kubelet[2906]: E0209 19:28:31.019247    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.020586 kubelet[2906]: E0209 19:28:31.020049    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.020586 kubelet[2906]: W0209 19:28:31.020063    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.020586 kubelet[2906]: E0209 19:28:31.020170    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.020586 kubelet[2906]: E0209 19:28:31.020358    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.020586 kubelet[2906]: W0209 19:28:31.020376    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.020586 kubelet[2906]: E0209 19:28:31.020497    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.021130 kubelet[2906]: E0209 19:28:31.020988    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.021130 kubelet[2906]: W0209 19:28:31.021010    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.021130 kubelet[2906]: E0209 19:28:31.021028    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.021644 kubelet[2906]: E0209 19:28:31.021356    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.021644 kubelet[2906]: W0209 19:28:31.021367    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.021644 kubelet[2906]: E0209 19:28:31.021396    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.022022 kubelet[2906]: E0209 19:28:31.021921    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.022022 kubelet[2906]: W0209 19:28:31.021933    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.022290 kubelet[2906]: E0209 19:28:31.022167    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.022438 kubelet[2906]: E0209 19:28:31.022428    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.022784 kubelet[2906]: W0209 19:28:31.022636    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.022784 kubelet[2906]: E0209 19:28:31.022660    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.023109 kubelet[2906]: E0209 19:28:31.023097    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.023203 kubelet[2906]: W0209 19:28:31.023191    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.023310 kubelet[2906]: E0209 19:28:31.023300    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.023678 kubelet[2906]: E0209 19:28:31.023666    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.023829 kubelet[2906]: W0209 19:28:31.023818    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.023896 kubelet[2906]: E0209 19:28:31.023889    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.024518 kubelet[2906]: E0209 19:28:31.024506    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.024631 kubelet[2906]: W0209 19:28:31.024617    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.024763 kubelet[2906]: E0209 19:28:31.024753    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.025420 kubelet[2906]: E0209 19:28:31.025408    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.025526 kubelet[2906]: W0209 19:28:31.025513    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.025621 kubelet[2906]: E0209 19:28:31.025602    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.026165 kubelet[2906]: E0209 19:28:31.026153    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.026399 kubelet[2906]: W0209 19:28:31.026384    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.026575 kubelet[2906]: E0209 19:28:31.026562    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.026886 kubelet[2906]: E0209 19:28:31.026874    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.026976 kubelet[2906]: W0209 19:28:31.026964    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.027063 kubelet[2906]: E0209 19:28:31.027055    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.027361 kubelet[2906]: E0209 19:28:31.027350    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.027456 kubelet[2906]: W0209 19:28:31.027443    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.027545 kubelet[2906]: E0209 19:28:31.027535    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.027865 kubelet[2906]: E0209 19:28:31.027853    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.027954 kubelet[2906]: W0209 19:28:31.027941    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.028043 kubelet[2906]: E0209 19:28:31.028034    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.028337 kubelet[2906]: E0209 19:28:31.028325    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.028422 kubelet[2906]: W0209 19:28:31.028410    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.028529 kubelet[2906]: E0209 19:28:31.028519    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.029005 kubelet[2906]: E0209 19:28:31.028995    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.029773 kubelet[2906]: W0209 19:28:31.029756    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.029953 kubelet[2906]: E0209 19:28:31.029940    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.032500 kubelet[2906]: E0209 19:28:31.032485    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.032604 kubelet[2906]: W0209 19:28:31.032592    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.032731 kubelet[2906]: E0209 19:28:31.032719    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.033013 kubelet[2906]: E0209 19:28:31.033003    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.033079 kubelet[2906]: W0209 19:28:31.033071    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.033159 kubelet[2906]: E0209 19:28:31.033152    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.033872 kubelet[2906]: E0209 19:28:31.033858    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.033968 kubelet[2906]: W0209 19:28:31.033956    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.034073 kubelet[2906]: E0209 19:28:31.034063    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.034922 kubelet[2906]: E0209 19:28:31.034879    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.035012 kubelet[2906]: W0209 19:28:31.035002    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.035090 kubelet[2906]: E0209 19:28:31.035083    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.083807 kubelet[2906]: E0209 19:28:31.083787    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.083962 kubelet[2906]: W0209 19:28:31.083949    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.084041 kubelet[2906]: E0209 19:28:31.084032    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.126195 kubelet[2906]: E0209 19:28:31.126175    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.126343 kubelet[2906]: W0209 19:28:31.126332    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.126400 kubelet[2906]: E0209 19:28:31.126393    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.127192 kubelet[2906]: E0209 19:28:31.127163    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.127334 kubelet[2906]: W0209 19:28:31.127319    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.127416 kubelet[2906]: E0209 19:28:31.127406    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.228273 kubelet[2906]: E0209 19:28:31.228245    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.228273 kubelet[2906]: W0209 19:28:31.228264    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.228273 kubelet[2906]: E0209 19:28:31.228289    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.228578 kubelet[2906]: E0209 19:28:31.228557    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.228578 kubelet[2906]: W0209 19:28:31.228567    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.228671 kubelet[2906]: E0209 19:28:31.228583    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.283463 kubelet[2906]: E0209 19:28:31.283432    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.283463 kubelet[2906]: W0209 19:28:31.283457    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.283631 kubelet[2906]: E0209 19:28:31.283480    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.329880 kubelet[2906]: E0209 19:28:31.329853    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.330095 kubelet[2906]: W0209 19:28:31.330076    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.330185 kubelet[2906]: E0209 19:28:31.330175    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.431131 kubelet[2906]: E0209 19:28:31.431105    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.431323 kubelet[2906]: W0209 19:28:31.431303    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.431466 kubelet[2906]: E0209 19:28:31.431448    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.532653 kubelet[2906]: E0209 19:28:31.532558    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.532653 kubelet[2906]: W0209 19:28:31.532577    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.532653 kubelet[2906]: E0209 19:28:31.532601    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.633948 kubelet[2906]: E0209 19:28:31.633919    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.633948 kubelet[2906]: W0209 19:28:31.633944    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.634145 kubelet[2906]: E0209 19:28:31.633971    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.734981 kubelet[2906]: E0209 19:28:31.734956    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.735173 kubelet[2906]: W0209 19:28:31.735154    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.735278 kubelet[2906]: E0209 19:28:31.735266    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.739000 audit[3442]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:31.739000 audit[3442]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff3917bb90 a2=0 a3=7fff3917bb7c items=0 ppid=3117 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:31.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:31.741000 audit[3442]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:31.741000 audit[3442]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff3917bb90 a2=0 a3=7fff3917bb7c items=0 ppid=3117 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:31.741000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:31.836580 kubelet[2906]: E0209 19:28:31.836475    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.836580 kubelet[2906]: W0209 19:28:31.836495    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.836580 kubelet[2906]: E0209 19:28:31.836522    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:31.918077 kubelet[2906]: E0209 19:28:31.918035    2906 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition
Feb  9 19:28:31.918450 kubelet[2906]: E0209 19:28:31.918423    2906 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/af6b02d1-d5b1-4499-9206-b923046863e7-node-certs podName:af6b02d1-d5b1-4499-9206-b923046863e7 nodeName:}" failed. No retries permitted until 2024-02-09 19:28:32.418403322 +0000 UTC m=+22.849399940 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/af6b02d1-d5b1-4499-9206-b923046863e7-node-certs") pod "calico-node-tqrtl" (UID: "af6b02d1-d5b1-4499-9206-b923046863e7") : failed to sync secret cache: timed out waiting for the condition
Feb  9 19:28:31.937668 kubelet[2906]: E0209 19:28:31.937644    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:31.937909 kubelet[2906]: W0209 19:28:31.937875    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:31.938011 kubelet[2906]: E0209 19:28:31.938000    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.039056 kubelet[2906]: E0209 19:28:32.039025    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.039056 kubelet[2906]: W0209 19:28:32.039046    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.039222 kubelet[2906]: E0209 19:28:32.039071    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.139960 kubelet[2906]: E0209 19:28:32.139851    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.139960 kubelet[2906]: W0209 19:28:32.139872    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.139960 kubelet[2906]: E0209 19:28:32.139899    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.240931 kubelet[2906]: E0209 19:28:32.240906    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.241108 kubelet[2906]: W0209 19:28:32.241091    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.241193 kubelet[2906]: E0209 19:28:32.241183    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.343893 kubelet[2906]: E0209 19:28:32.343862    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.343893 kubelet[2906]: W0209 19:28:32.343888    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.344297 kubelet[2906]: E0209 19:28:32.343914    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.444921 kubelet[2906]: E0209 19:28:32.444894    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.444921 kubelet[2906]: W0209 19:28:32.444914    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.445134 kubelet[2906]: E0209 19:28:32.444939    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.445574 kubelet[2906]: E0209 19:28:32.445553    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.445574 kubelet[2906]: W0209 19:28:32.445572    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.445772 kubelet[2906]: E0209 19:28:32.445593    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.445868 kubelet[2906]: E0209 19:28:32.445854    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.445920 kubelet[2906]: W0209 19:28:32.445871    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.445920 kubelet[2906]: E0209 19:28:32.445890    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.446092 kubelet[2906]: E0209 19:28:32.446077    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.446155 kubelet[2906]: W0209 19:28:32.446102    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.446155 kubelet[2906]: E0209 19:28:32.446120    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.446360 kubelet[2906]: E0209 19:28:32.446346    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.446447 kubelet[2906]: W0209 19:28:32.446361    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.446447 kubelet[2906]: E0209 19:28:32.446377    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.456551 kubelet[2906]: E0209 19:28:32.456525    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:32.456551 kubelet[2906]: W0209 19:28:32.456548    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:32.456551 kubelet[2906]: E0209 19:28:32.456572    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:32.494109 env[1569]: time="2024-02-09T19:28:32.493941285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tqrtl,Uid:af6b02d1-d5b1-4499-9206-b923046863e7,Namespace:calico-system,Attempt:0,}"
Feb  9 19:28:32.577388 env[1569]: time="2024-02-09T19:28:32.577242961Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:28:32.577604 env[1569]: time="2024-02-09T19:28:32.577572844Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:28:32.577841 env[1569]: time="2024-02-09T19:28:32.577811610Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:28:32.578447 env[1569]: time="2024-02-09T19:28:32.578388715Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0 pid=3464 runtime=io.containerd.runc.v2
Feb  9 19:28:32.623309 systemd[1]: Started cri-containerd-c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0.scope.
Feb  9 19:28:32.647854 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount317269898.mount: Deactivated successfully.
Feb  9 19:28:32.663484 systemd[1]: run-containerd-runc-k8s.io-c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0-runc.dHOBDW.mount: Deactivated successfully.
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.711000 audit: BPF prog-id=137 op=LOAD
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3464 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:32.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338366466393264333866356430656134323162653334333938623130
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3464 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:32.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338366466393264333866356430656134323162653334333938623130
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit: BPF prog-id=138 op=LOAD
Feb  9 19:28:32.713000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b8560 items=0 ppid=3464 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:32.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338366466393264333866356430656134323162653334333938623130
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit: BPF prog-id=139 op=LOAD
Feb  9 19:28:32.713000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b85a8 items=0 ppid=3464 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:32.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338366466393264333866356430656134323162653334333938623130
Feb  9 19:28:32.713000 audit: BPF prog-id=139 op=UNLOAD
Feb  9 19:28:32.713000 audit: BPF prog-id=138 op=UNLOAD
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { perfmon } for  pid=3476 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit[3476]: AVC avc:  denied  { bpf } for  pid=3476 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:32.713000 audit: BPF prog-id=140 op=LOAD
Feb  9 19:28:32.713000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b89b8 items=0 ppid=3464 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:32.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338366466393264333866356430656134323162653334333938623130
Feb  9 19:28:32.735066 env[1569]: time="2024-02-09T19:28:32.735012530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tqrtl,Uid:af6b02d1-d5b1-4499-9206-b923046863e7,Namespace:calico-system,Attempt:0,} returns sandbox id \"c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0\""
Feb  9 19:28:32.816516 kubelet[2906]: E0209 19:28:32.815724    2906 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:34.811601 kubelet[2906]: E0209 19:28:34.811562    2906 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:35.633017 env[1569]: time="2024-02-09T19:28:35.632937562Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:35.637354 env[1569]: time="2024-02-09T19:28:35.637293767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:35.640190 env[1569]: time="2024-02-09T19:28:35.640134139Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:35.643383 env[1569]: time="2024-02-09T19:28:35.643343965Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:35.644434 env[1569]: time="2024-02-09T19:28:35.644398765Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\""
Feb  9 19:28:35.674565 env[1569]: time="2024-02-09T19:28:35.674518947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\""
Feb  9 19:28:35.685652 env[1569]: time="2024-02-09T19:28:35.685602693Z" level=info msg="CreateContainer within sandbox \"afde5fb1f7b0a3448c5792f35048f1ea3a7a0d32518963168a9058f47e14ff53\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}"
Feb  9 19:28:35.707978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3964510482.mount: Deactivated successfully.
Feb  9 19:28:35.716494 env[1569]: time="2024-02-09T19:28:35.716440560Z" level=info msg="CreateContainer within sandbox \"afde5fb1f7b0a3448c5792f35048f1ea3a7a0d32518963168a9058f47e14ff53\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2438b485ef20f9334bf3c87d80c74a231a841d8f49b9a1c8e93e02325b263ed2\""
Feb  9 19:28:35.717271 env[1569]: time="2024-02-09T19:28:35.717236659Z" level=info msg="StartContainer for \"2438b485ef20f9334bf3c87d80c74a231a841d8f49b9a1c8e93e02325b263ed2\""
Feb  9 19:28:35.748196 systemd[1]: Started cri-containerd-2438b485ef20f9334bf3c87d80c74a231a841d8f49b9a1c8e93e02325b263ed2.scope.
Feb  9 19:28:35.789731 kernel: kauditd_printk_skb: 122 callbacks suppressed
Feb  9 19:28:35.789901 kernel: audit: type=1400 audit(1707506915.784:1171): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.784000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.784000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.795937 kernel: audit: type=1400 audit(1707506915.784:1172): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802853 kernel: audit: type=1400 audit(1707506915.784:1173): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.784000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.811300 kernel: audit: type=1400 audit(1707506915.784:1174): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.784000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.784000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.819853 kernel: audit: type=1400 audit(1707506915.784:1175): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.784000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.829360 kernel: audit: type=1400 audit(1707506915.784:1176): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.829496 kernel: audit: type=1400 audit(1707506915.784:1177): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.784000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.784000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.784000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.839449 kernel: audit: type=1400 audit(1707506915.784:1178): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.839559 kernel: audit: type=1400 audit(1707506915.784:1179): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.785000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.847947 kernel: audit: type=1400 audit(1707506915.785:1180): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.785000 audit: BPF prog-id=141 op=LOAD
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3340 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:35.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333862343835656632306639333334626633633837643830633734
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3340 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:35.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333862343835656632306639333334626633633837643830633734
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.801000 audit: BPF prog-id=142 op=LOAD
Feb  9 19:28:35.801000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024d8b0 items=0 ppid=3340 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:35.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333862343835656632306639333334626633633837643830633734
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit: BPF prog-id=143 op=LOAD
Feb  9 19:28:35.802000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024d8f8 items=0 ppid=3340 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:35.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333862343835656632306639333334626633633837643830633734
Feb  9 19:28:35.802000 audit: BPF prog-id=143 op=UNLOAD
Feb  9 19:28:35.802000 audit: BPF prog-id=142 op=UNLOAD
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { perfmon } for  pid=3509 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit[3509]: AVC avc:  denied  { bpf } for  pid=3509 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:35.802000 audit: BPF prog-id=144 op=LOAD
Feb  9 19:28:35.802000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024dd08 items=0 ppid=3340 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:35.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333862343835656632306639333334626633633837643830633734
Feb  9 19:28:35.889013 env[1569]: time="2024-02-09T19:28:35.888905195Z" level=info msg="StartContainer for \"2438b485ef20f9334bf3c87d80c74a231a841d8f49b9a1c8e93e02325b263ed2\" returns successfully"
Feb  9 19:28:35.968395 kubelet[2906]: E0209 19:28:35.968364    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.968395 kubelet[2906]: W0209 19:28:35.968390    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.969050 kubelet[2906]: E0209 19:28:35.968415    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.969050 kubelet[2906]: E0209 19:28:35.968641    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.969050 kubelet[2906]: W0209 19:28:35.968651    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.969050 kubelet[2906]: E0209 19:28:35.968667    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.969050 kubelet[2906]: E0209 19:28:35.968870    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.969050 kubelet[2906]: W0209 19:28:35.968880    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.969050 kubelet[2906]: E0209 19:28:35.968898    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.969399 kubelet[2906]: E0209 19:28:35.969113    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.969399 kubelet[2906]: W0209 19:28:35.969123    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.969399 kubelet[2906]: E0209 19:28:35.969138    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.969399 kubelet[2906]: E0209 19:28:35.969307    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.969399 kubelet[2906]: W0209 19:28:35.969315    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.969399 kubelet[2906]: E0209 19:28:35.969329    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.969900 kubelet[2906]: E0209 19:28:35.969499    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.969900 kubelet[2906]: W0209 19:28:35.969507    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.969900 kubelet[2906]: E0209 19:28:35.969521    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.970046 kubelet[2906]: E0209 19:28:35.969970    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.970046 kubelet[2906]: W0209 19:28:35.969981    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.970046 kubelet[2906]: E0209 19:28:35.969999    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.970194 kubelet[2906]: E0209 19:28:35.970178    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.970194 kubelet[2906]: W0209 19:28:35.970186    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.970393 kubelet[2906]: E0209 19:28:35.970200    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.970483 kubelet[2906]: E0209 19:28:35.970467    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.970654 kubelet[2906]: W0209 19:28:35.970483    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.970654 kubelet[2906]: E0209 19:28:35.970580    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.970813 kubelet[2906]: E0209 19:28:35.970794    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.971082 kubelet[2906]: W0209 19:28:35.970813    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.971082 kubelet[2906]: E0209 19:28:35.970829    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.971296 kubelet[2906]: E0209 19:28:35.971203    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.971296 kubelet[2906]: W0209 19:28:35.971213    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.971296 kubelet[2906]: E0209 19:28:35.971228    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.971449 kubelet[2906]: E0209 19:28:35.971424    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.971449 kubelet[2906]: W0209 19:28:35.971432    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.971449 kubelet[2906]: E0209 19:28:35.971447    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.982481 kubelet[2906]: E0209 19:28:35.982365    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.982481 kubelet[2906]: W0209 19:28:35.982479    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.982761 kubelet[2906]: E0209 19:28:35.982504    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.982837 kubelet[2906]: E0209 19:28:35.982824    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.982953 kubelet[2906]: W0209 19:28:35.982838    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.982953 kubelet[2906]: E0209 19:28:35.982859    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.983291 kubelet[2906]: E0209 19:28:35.983274    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.983291 kubelet[2906]: W0209 19:28:35.983290    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.983425 kubelet[2906]: E0209 19:28:35.983310    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.983572 kubelet[2906]: E0209 19:28:35.983539    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.983572 kubelet[2906]: W0209 19:28:35.983553    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.983572 kubelet[2906]: E0209 19:28:35.983572    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.983896 kubelet[2906]: E0209 19:28:35.983877    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.983896 kubelet[2906]: W0209 19:28:35.983888    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.984061 kubelet[2906]: E0209 19:28:35.983950    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.984339 kubelet[2906]: E0209 19:28:35.984317    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.984339 kubelet[2906]: W0209 19:28:35.984334    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.984486 kubelet[2906]: E0209 19:28:35.984428    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.984587 kubelet[2906]: E0209 19:28:35.984568    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.984587 kubelet[2906]: W0209 19:28:35.984582    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.984887 kubelet[2906]: E0209 19:28:35.984666    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.984983 kubelet[2906]: E0209 19:28:35.984961    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.984983 kubelet[2906]: W0209 19:28:35.984972    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.985110 kubelet[2906]: E0209 19:28:35.985084    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.985236 kubelet[2906]: E0209 19:28:35.985217    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.985236 kubelet[2906]: W0209 19:28:35.985230    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.985398 kubelet[2906]: E0209 19:28:35.985250    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.989807 kubelet[2906]: E0209 19:28:35.989782    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.989807 kubelet[2906]: W0209 19:28:35.989800    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.989999 kubelet[2906]: E0209 19:28:35.989915    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.992220 kubelet[2906]: E0209 19:28:35.992197    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.992390 kubelet[2906]: W0209 19:28:35.992281    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.992636 kubelet[2906]: E0209 19:28:35.992405    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.993733 kubelet[2906]: E0209 19:28:35.993657    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.993733 kubelet[2906]: W0209 19:28:35.993719    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.994568 kubelet[2906]: E0209 19:28:35.994135    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.995022 kubelet[2906]: E0209 19:28:35.994952    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.995022 kubelet[2906]: W0209 19:28:35.994964    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.995141 kubelet[2906]: E0209 19:28:35.995117    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.995306 kubelet[2906]: E0209 19:28:35.995285    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.995306 kubelet[2906]: W0209 19:28:35.995301    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.995480 kubelet[2906]: E0209 19:28:35.995321    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.997375 kubelet[2906]: E0209 19:28:35.997358    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.997375 kubelet[2906]: W0209 19:28:35.997375    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.997621 kubelet[2906]: E0209 19:28:35.997474    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.998082 kubelet[2906]: E0209 19:28:35.998008    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.998082 kubelet[2906]: W0209 19:28:35.998079    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.998512 kubelet[2906]: E0209 19:28:35.998103    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.999430 kubelet[2906]: E0209 19:28:35.999412    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.999430 kubelet[2906]: W0209 19:28:35.999430    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.999560 kubelet[2906]: E0209 19:28:35.999526    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:35.999725 kubelet[2906]: E0209 19:28:35.999711    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:35.999808 kubelet[2906]: W0209 19:28:35.999726    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:35.999808 kubelet[2906]: E0209 19:28:35.999745    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.812182 kubelet[2906]: E0209 19:28:36.812141    2906 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:36.944242 kubelet[2906]: I0209 19:28:36.944211    2906 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness"
Feb  9 19:28:36.980066 kubelet[2906]: E0209 19:28:36.980035    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.980066 kubelet[2906]: W0209 19:28:36.980057    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.980718 kubelet[2906]: E0209 19:28:36.980081    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.980718 kubelet[2906]: E0209 19:28:36.980307    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.980718 kubelet[2906]: W0209 19:28:36.980317    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.980718 kubelet[2906]: E0209 19:28:36.980335    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.980718 kubelet[2906]: E0209 19:28:36.980514    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.980718 kubelet[2906]: W0209 19:28:36.980522    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.980718 kubelet[2906]: E0209 19:28:36.980592    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.981141 kubelet[2906]: E0209 19:28:36.980841    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.981141 kubelet[2906]: W0209 19:28:36.980851    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.981141 kubelet[2906]: E0209 19:28:36.980867    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.981141 kubelet[2906]: E0209 19:28:36.981083    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.981141 kubelet[2906]: W0209 19:28:36.981093    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.981141 kubelet[2906]: E0209 19:28:36.981108    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.981419 kubelet[2906]: E0209 19:28:36.981270    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.981419 kubelet[2906]: W0209 19:28:36.981278    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.981419 kubelet[2906]: E0209 19:28:36.981294    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.981564 kubelet[2906]: E0209 19:28:36.981522    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.981564 kubelet[2906]: W0209 19:28:36.981531    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.981564 kubelet[2906]: E0209 19:28:36.981545    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.981866 kubelet[2906]: E0209 19:28:36.981833    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.981866 kubelet[2906]: W0209 19:28:36.981845    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.981866 kubelet[2906]: E0209 19:28:36.981862    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.982058 kubelet[2906]: E0209 19:28:36.982034    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.982058 kubelet[2906]: W0209 19:28:36.982048    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.982182 kubelet[2906]: E0209 19:28:36.982061    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.982266 kubelet[2906]: E0209 19:28:36.982248    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.982266 kubelet[2906]: W0209 19:28:36.982262    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.982377 kubelet[2906]: E0209 19:28:36.982277    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.982474 kubelet[2906]: E0209 19:28:36.982457    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.982474 kubelet[2906]: W0209 19:28:36.982470    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.982601 kubelet[2906]: E0209 19:28:36.982485    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.982668 kubelet[2906]: E0209 19:28:36.982656    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.982741 kubelet[2906]: W0209 19:28:36.982668    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.982741 kubelet[2906]: E0209 19:28:36.982712    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.996153 kubelet[2906]: E0209 19:28:36.996124    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.996153 kubelet[2906]: W0209 19:28:36.996144    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.996404 kubelet[2906]: E0209 19:28:36.996171    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.996502 kubelet[2906]: E0209 19:28:36.996485    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.996565 kubelet[2906]: W0209 19:28:36.996501    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.996565 kubelet[2906]: E0209 19:28:36.996562    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.996854 kubelet[2906]: E0209 19:28:36.996836    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.996854 kubelet[2906]: W0209 19:28:36.996853    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.997000 kubelet[2906]: E0209 19:28:36.996874    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.997159 kubelet[2906]: E0209 19:28:36.997142    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.997159 kubelet[2906]: W0209 19:28:36.997155    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.997283 kubelet[2906]: E0209 19:28:36.997178    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.997451 kubelet[2906]: E0209 19:28:36.997433    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.997451 kubelet[2906]: W0209 19:28:36.997446    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.997595 kubelet[2906]: E0209 19:28:36.997470    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.997766 kubelet[2906]: E0209 19:28:36.997749    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.997766 kubelet[2906]: W0209 19:28:36.997763    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.998007 kubelet[2906]: E0209 19:28:36.997991    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.998118 kubelet[2906]: E0209 19:28:36.998055    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.998205 kubelet[2906]: W0209 19:28:36.998116    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.998292 kubelet[2906]: E0209 19:28:36.998279    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.998382 kubelet[2906]: E0209 19:28:36.998307    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.998382 kubelet[2906]: W0209 19:28:36.998380    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.998539 kubelet[2906]: E0209 19:28:36.998528    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.998612 kubelet[2906]: E0209 19:28:36.998599    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.998665 kubelet[2906]: W0209 19:28:36.998615    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.998665 kubelet[2906]: E0209 19:28:36.998631    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.999365 kubelet[2906]: E0209 19:28:36.999347    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.999365 kubelet[2906]: W0209 19:28:36.999360    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.999507 kubelet[2906]: E0209 19:28:36.999382    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:36.999612 kubelet[2906]: E0209 19:28:36.999596    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:36.999612 kubelet[2906]: W0209 19:28:36.999609    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:36.999766 kubelet[2906]: E0209 19:28:36.999628    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:37.000205 kubelet[2906]: E0209 19:28:37.000022    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:37.000292 kubelet[2906]: W0209 19:28:37.000211    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:37.000292 kubelet[2906]: E0209 19:28:37.000239    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:37.000771 kubelet[2906]: E0209 19:28:37.000753    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:37.000771 kubelet[2906]: W0209 19:28:37.000768    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:37.000943 kubelet[2906]: E0209 19:28:37.000868    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:37.001054 kubelet[2906]: E0209 19:28:37.001038    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:37.001054 kubelet[2906]: W0209 19:28:37.001051    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:37.001244 kubelet[2906]: E0209 19:28:37.001141    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:37.001445 kubelet[2906]: E0209 19:28:37.001426    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:37.001445 kubelet[2906]: W0209 19:28:37.001441    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:37.001588 kubelet[2906]: E0209 19:28:37.001458    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:37.001678 kubelet[2906]: E0209 19:28:37.001661    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:37.001678 kubelet[2906]: W0209 19:28:37.001674    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:37.001832 kubelet[2906]: E0209 19:28:37.001738    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:37.001980 kubelet[2906]: E0209 19:28:37.001964    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:37.001980 kubelet[2906]: W0209 19:28:37.001977    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:37.002147 kubelet[2906]: E0209 19:28:37.001993    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:37.002584 kubelet[2906]: E0209 19:28:37.002501    2906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 19:28:37.002584 kubelet[2906]: W0209 19:28:37.002514    2906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 19:28:37.002708 kubelet[2906]: E0209 19:28:37.002591    2906 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 19:28:38.812068 kubelet[2906]: E0209 19:28:38.812015    2906 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:39.019828 env[1569]: time="2024-02-09T19:28:39.019666936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:39.043102 env[1569]: time="2024-02-09T19:28:39.041454856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:39.057131 env[1569]: time="2024-02-09T19:28:39.057035556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:39.073466 env[1569]: time="2024-02-09T19:28:39.070590913Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:39.074341 env[1569]: time="2024-02-09T19:28:39.074298106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\""
Feb  9 19:28:39.079633 env[1569]: time="2024-02-09T19:28:39.079586638Z" level=info msg="CreateContainer within sandbox \"c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Feb  9 19:28:39.144932 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount991235703.mount: Deactivated successfully.
Feb  9 19:28:39.161207 env[1569]: time="2024-02-09T19:28:39.161150437Z" level=info msg="CreateContainer within sandbox \"c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a4b169d41115a461ca79d898239b0c64b2b897180e8fe4e68e6dff7a5b6e1899\""
Feb  9 19:28:39.162145 env[1569]: time="2024-02-09T19:28:39.162111763Z" level=info msg="StartContainer for \"a4b169d41115a461ca79d898239b0c64b2b897180e8fe4e68e6dff7a5b6e1899\""
Feb  9 19:28:39.198393 systemd[1]: Started cri-containerd-a4b169d41115a461ca79d898239b0c64b2b897180e8fe4e68e6dff7a5b6e1899.scope.
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3464 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:39.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623136396434313131356134363163613739643839383233396230
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit: BPF prog-id=145 op=LOAD
Feb  9 19:28:39.221000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00010ada0 items=0 ppid=3464 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:39.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623136396434313131356134363163613739643839383233396230
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit: BPF prog-id=146 op=LOAD
Feb  9 19:28:39.221000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00010ade8 items=0 ppid=3464 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:39.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623136396434313131356134363163613739643839383233396230
Feb  9 19:28:39.221000 audit: BPF prog-id=146 op=UNLOAD
Feb  9 19:28:39.221000 audit: BPF prog-id=145 op=UNLOAD
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { perfmon } for  pid=3606 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit[3606]: AVC avc:  denied  { bpf } for  pid=3606 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:39.221000 audit: BPF prog-id=147 op=LOAD
Feb  9 19:28:39.221000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00010ae78 items=0 ppid=3464 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:39.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623136396434313131356134363163613739643839383233396230
Feb  9 19:28:39.252054 env[1569]: time="2024-02-09T19:28:39.252003470Z" level=info msg="StartContainer for \"a4b169d41115a461ca79d898239b0c64b2b897180e8fe4e68e6dff7a5b6e1899\" returns successfully"
Feb  9 19:28:39.276723 systemd[1]: cri-containerd-a4b169d41115a461ca79d898239b0c64b2b897180e8fe4e68e6dff7a5b6e1899.scope: Deactivated successfully.
Feb  9 19:28:39.282000 audit: BPF prog-id=147 op=UNLOAD
Feb  9 19:28:39.350108 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a4b169d41115a461ca79d898239b0c64b2b897180e8fe4e68e6dff7a5b6e1899-rootfs.mount: Deactivated successfully.
Feb  9 19:28:39.524207 env[1569]: time="2024-02-09T19:28:39.523901167Z" level=info msg="shim disconnected" id=a4b169d41115a461ca79d898239b0c64b2b897180e8fe4e68e6dff7a5b6e1899
Feb  9 19:28:39.524531 env[1569]: time="2024-02-09T19:28:39.524505661Z" level=warning msg="cleaning up after shim disconnected" id=a4b169d41115a461ca79d898239b0c64b2b897180e8fe4e68e6dff7a5b6e1899 namespace=k8s.io
Feb  9 19:28:39.524661 env[1569]: time="2024-02-09T19:28:39.524638376Z" level=info msg="cleaning up dead shim"
Feb  9 19:28:39.538578 env[1569]: time="2024-02-09T19:28:39.538531343Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:28:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3647 runtime=io.containerd.runc.v2\n"
Feb  9 19:28:39.964934 env[1569]: time="2024-02-09T19:28:39.964875001Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\""
Feb  9 19:28:40.003010 kubelet[2906]: I0209 19:28:40.002972    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-65cd596556-q457s" podStartSLOduration=-9.223372026851852e+09 pod.CreationTimestamp="2024-02-09 19:28:30 +0000 UTC" firstStartedPulling="2024-02-09 19:28:31.01272516 +0000 UTC m=+21.443721779" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:35.973996562 +0000 UTC m=+26.404993189" watchObservedRunningTime="2024-02-09 19:28:40.002923737 +0000 UTC m=+30.433920377"
Feb  9 19:28:40.812725 kubelet[2906]: E0209 19:28:40.812678    2906 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:41.749958 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount435447863.mount: Deactivated successfully.
Feb  9 19:28:42.815549 kubelet[2906]: E0209 19:28:42.812284    2906 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:44.811730 kubelet[2906]: E0209 19:28:44.811679    2906 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:46.811853 kubelet[2906]: E0209 19:28:46.811809    2906 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:47.151741 env[1569]: time="2024-02-09T19:28:47.151269671Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:47.155763 env[1569]: time="2024-02-09T19:28:47.155716160Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:47.158387 env[1569]: time="2024-02-09T19:28:47.158273284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:47.163066 env[1569]: time="2024-02-09T19:28:47.162931223Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:47.164912 env[1569]: time="2024-02-09T19:28:47.164873335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\""
Feb  9 19:28:47.170955 env[1569]: time="2024-02-09T19:28:47.170907388Z" level=info msg="CreateContainer within sandbox \"c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Feb  9 19:28:47.191120 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4174442135.mount: Deactivated successfully.
Feb  9 19:28:47.197364 env[1569]: time="2024-02-09T19:28:47.197308855Z" level=info msg="CreateContainer within sandbox \"c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"787be875db5667919eefd8ce179a20ec05ab71e819e4225603a67021ed709d1d\""
Feb  9 19:28:47.199839 env[1569]: time="2024-02-09T19:28:47.199703501Z" level=info msg="StartContainer for \"787be875db5667919eefd8ce179a20ec05ab71e819e4225603a67021ed709d1d\""
Feb  9 19:28:47.247888 systemd[1]: Started cri-containerd-787be875db5667919eefd8ce179a20ec05ab71e819e4225603a67021ed709d1d.scope.
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.283318 kernel: kauditd_printk_skb: 91 callbacks suppressed
Feb  9 19:28:47.283428 kernel: audit: type=1400 audit(1707506927.280:1196): avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3464 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:47.295245 kernel: audit: type=1300 audit(1707506927.280:1196): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3464 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:47.295452 kernel: audit: type=1327 audit(1707506927.280:1196): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738376265383735646235363637393139656566643863653137396132
Feb  9 19:28:47.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738376265383735646235363637393139656566643863653137396132
Feb  9 19:28:47.307145 kernel: audit: type=1400 audit(1707506927.280:1197): avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.307271 kernel: audit: type=1400 audit(1707506927.280:1197): avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.317150 kernel: audit: type=1400 audit(1707506927.280:1197): avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.317379 kernel: audit: type=1400 audit(1707506927.280:1197): avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.322275 kernel: audit: type=1400 audit(1707506927.280:1197): avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.336743 kernel: audit: type=1400 audit(1707506927.280:1197): avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.280000 audit: BPF prog-id=148 op=LOAD
Feb  9 19:28:47.280000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003384e0 items=0 ppid=3464 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:47.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738376265383735646235363637393139656566643863653137396132
Feb  9 19:28:47.286000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.351920 kernel: audit: type=1400 audit(1707506927.280:1197): avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.286000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.286000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.286000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.286000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.286000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.286000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.286000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.286000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.286000 audit: BPF prog-id=149 op=LOAD
Feb  9 19:28:47.286000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000338528 items=0 ppid=3464 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:47.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738376265383735646235363637393139656566643863653137396132
Feb  9 19:28:47.305000 audit: BPF prog-id=149 op=UNLOAD
Feb  9 19:28:47.305000 audit: BPF prog-id=148 op=UNLOAD
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { perfmon } for  pid=3672 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit[3672]: AVC avc:  denied  { bpf } for  pid=3672 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:47.305000 audit: BPF prog-id=150 op=LOAD
Feb  9 19:28:47.305000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003385b8 items=0 ppid=3464 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:47.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738376265383735646235363637393139656566643863653137396132
Feb  9 19:28:47.370225 env[1569]: time="2024-02-09T19:28:47.370067620Z" level=info msg="StartContainer for \"787be875db5667919eefd8ce179a20ec05ab71e819e4225603a67021ed709d1d\" returns successfully"
Feb  9 19:28:48.380869 env[1569]: time="2024-02-09T19:28:48.380621299Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Feb  9 19:28:48.384404 systemd[1]: cri-containerd-787be875db5667919eefd8ce179a20ec05ab71e819e4225603a67021ed709d1d.scope: Deactivated successfully.
Feb  9 19:28:48.386000 audit: BPF prog-id=150 op=UNLOAD
Feb  9 19:28:48.408613 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-787be875db5667919eefd8ce179a20ec05ab71e819e4225603a67021ed709d1d-rootfs.mount: Deactivated successfully.
Feb  9 19:28:48.421318 env[1569]: time="2024-02-09T19:28:48.421249955Z" level=info msg="shim disconnected" id=787be875db5667919eefd8ce179a20ec05ab71e819e4225603a67021ed709d1d
Feb  9 19:28:48.421318 env[1569]: time="2024-02-09T19:28:48.421302780Z" level=warning msg="cleaning up after shim disconnected" id=787be875db5667919eefd8ce179a20ec05ab71e819e4225603a67021ed709d1d namespace=k8s.io
Feb  9 19:28:48.421318 env[1569]: time="2024-02-09T19:28:48.421317149Z" level=info msg="cleaning up dead shim"
Feb  9 19:28:48.423833 kubelet[2906]: I0209 19:28:48.423798    2906 kubelet_node_status.go:493] "Fast updating node status as it just became ready"
Feb  9 19:28:48.443652 env[1569]: time="2024-02-09T19:28:48.443583014Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:28:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3718 runtime=io.containerd.runc.v2\n"
Feb  9 19:28:48.452112 kubelet[2906]: I0209 19:28:48.452077    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:48.461127 kubelet[2906]: I0209 19:28:48.461072    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:48.467314 systemd[1]: Created slice kubepods-burstable-pod30fb5769_46fd_45b8_8cbe_f223e147e943.slice.
Feb  9 19:28:48.470769 kubelet[2906]: I0209 19:28:48.469296    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:28:48.482307 systemd[1]: Created slice kubepods-burstable-pod64b71d7c_3082_4d3a_bf73_d4a8def05192.slice.
Feb  9 19:28:48.493213 systemd[1]: Created slice kubepods-besteffort-pod1de46490_a895_43fe_99d1_c548bdb7a466.slice.
Feb  9 19:28:48.494646 kubelet[2906]: I0209 19:28:48.494621    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/64b71d7c-3082-4d3a-bf73-d4a8def05192-config-volume\") pod \"coredns-787d4945fb-vgl6s\" (UID: \"64b71d7c-3082-4d3a-bf73-d4a8def05192\") " pod="kube-system/coredns-787d4945fb-vgl6s"
Feb  9 19:28:48.494817 kubelet[2906]: I0209 19:28:48.494674    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lrz88\" (UniqueName: \"kubernetes.io/projected/64b71d7c-3082-4d3a-bf73-d4a8def05192-kube-api-access-lrz88\") pod \"coredns-787d4945fb-vgl6s\" (UID: \"64b71d7c-3082-4d3a-bf73-d4a8def05192\") " pod="kube-system/coredns-787d4945fb-vgl6s"
Feb  9 19:28:48.494817 kubelet[2906]: I0209 19:28:48.494719    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/30fb5769-46fd-45b8-8cbe-f223e147e943-config-volume\") pod \"coredns-787d4945fb-9bcsp\" (UID: \"30fb5769-46fd-45b8-8cbe-f223e147e943\") " pod="kube-system/coredns-787d4945fb-9bcsp"
Feb  9 19:28:48.494817 kubelet[2906]: I0209 19:28:48.494762    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9f299\" (UniqueName: \"kubernetes.io/projected/1de46490-a895-43fe-99d1-c548bdb7a466-kube-api-access-9f299\") pod \"calico-kube-controllers-565445cd7d-48kd5\" (UID: \"1de46490-a895-43fe-99d1-c548bdb7a466\") " pod="calico-system/calico-kube-controllers-565445cd7d-48kd5"
Feb  9 19:28:48.494817 kubelet[2906]: I0209 19:28:48.494802    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1de46490-a895-43fe-99d1-c548bdb7a466-tigera-ca-bundle\") pod \"calico-kube-controllers-565445cd7d-48kd5\" (UID: \"1de46490-a895-43fe-99d1-c548bdb7a466\") " pod="calico-system/calico-kube-controllers-565445cd7d-48kd5"
Feb  9 19:28:48.495012 kubelet[2906]: I0209 19:28:48.494835    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dxdw7\" (UniqueName: \"kubernetes.io/projected/30fb5769-46fd-45b8-8cbe-f223e147e943-kube-api-access-dxdw7\") pod \"coredns-787d4945fb-9bcsp\" (UID: \"30fb5769-46fd-45b8-8cbe-f223e147e943\") " pod="kube-system/coredns-787d4945fb-9bcsp"
Feb  9 19:28:48.777052 env[1569]: time="2024-02-09T19:28:48.776994136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9bcsp,Uid:30fb5769-46fd-45b8-8cbe-f223e147e943,Namespace:kube-system,Attempt:0,}"
Feb  9 19:28:48.788839 env[1569]: time="2024-02-09T19:28:48.788795105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-vgl6s,Uid:64b71d7c-3082-4d3a-bf73-d4a8def05192,Namespace:kube-system,Attempt:0,}"
Feb  9 19:28:48.805813 env[1569]: time="2024-02-09T19:28:48.805766845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565445cd7d-48kd5,Uid:1de46490-a895-43fe-99d1-c548bdb7a466,Namespace:calico-system,Attempt:0,}"
Feb  9 19:28:48.819146 systemd[1]: Created slice kubepods-besteffort-podcc993e12_34a4_4fca_b5b6_b11e7c9e0ea1.slice.
Feb  9 19:28:48.822071 env[1569]: time="2024-02-09T19:28:48.822033075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-swjtr,Uid:cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1,Namespace:calico-system,Attempt:0,}"
Feb  9 19:28:48.985393 env[1569]: time="2024-02-09T19:28:48.985348000Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\""
Feb  9 19:28:49.067837 env[1569]: time="2024-02-09T19:28:49.067261094Z" level=error msg="Failed to destroy network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.068125 env[1569]: time="2024-02-09T19:28:49.068070704Z" level=error msg="encountered an error cleaning up failed sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.068220 env[1569]: time="2024-02-09T19:28:49.068157270Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-swjtr,Uid:cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.068447 kubelet[2906]: E0209 19:28:49.068424    2906 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.068545 kubelet[2906]: E0209 19:28:49.068502    2906 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-swjtr"
Feb  9 19:28:49.068545 kubelet[2906]: E0209 19:28:49.068535    2906 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-swjtr"
Feb  9 19:28:49.068641 kubelet[2906]: E0209 19:28:49.068607    2906 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-swjtr_calico-system(cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-swjtr_calico-system(cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:49.081983 env[1569]: time="2024-02-09T19:28:49.081899202Z" level=error msg="Failed to destroy network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.083318 env[1569]: time="2024-02-09T19:28:49.083260336Z" level=error msg="encountered an error cleaning up failed sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.083785 env[1569]: time="2024-02-09T19:28:49.083740213Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565445cd7d-48kd5,Uid:1de46490-a895-43fe-99d1-c548bdb7a466,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.088278 kubelet[2906]: E0209 19:28:49.084277    2906 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.088278 kubelet[2906]: E0209 19:28:49.084336    2906 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-565445cd7d-48kd5"
Feb  9 19:28:49.088278 kubelet[2906]: E0209 19:28:49.084383    2906 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-565445cd7d-48kd5"
Feb  9 19:28:49.088809 kubelet[2906]: E0209 19:28:49.084467    2906 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-565445cd7d-48kd5_calico-system(1de46490-a895-43fe-99d1-c548bdb7a466)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-565445cd7d-48kd5_calico-system(1de46490-a895-43fe-99d1-c548bdb7a466)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-565445cd7d-48kd5" podUID=1de46490-a895-43fe-99d1-c548bdb7a466
Feb  9 19:28:49.095351 env[1569]: time="2024-02-09T19:28:49.095290850Z" level=error msg="Failed to destroy network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.095882 env[1569]: time="2024-02-09T19:28:49.095831915Z" level=error msg="encountered an error cleaning up failed sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.096008 env[1569]: time="2024-02-09T19:28:49.095901692Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9bcsp,Uid:30fb5769-46fd-45b8-8cbe-f223e147e943,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.096730 kubelet[2906]: E0209 19:28:49.096225    2906 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.096730 kubelet[2906]: E0209 19:28:49.096290    2906 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-9bcsp"
Feb  9 19:28:49.096730 kubelet[2906]: E0209 19:28:49.096323    2906 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-9bcsp"
Feb  9 19:28:49.096942 kubelet[2906]: E0209 19:28:49.096401    2906 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-9bcsp_kube-system(30fb5769-46fd-45b8-8cbe-f223e147e943)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-9bcsp_kube-system(30fb5769-46fd-45b8-8cbe-f223e147e943)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-9bcsp" podUID=30fb5769-46fd-45b8-8cbe-f223e147e943
Feb  9 19:28:49.105056 env[1569]: time="2024-02-09T19:28:49.104995621Z" level=error msg="Failed to destroy network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.105470 env[1569]: time="2024-02-09T19:28:49.105420413Z" level=error msg="encountered an error cleaning up failed sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.105571 env[1569]: time="2024-02-09T19:28:49.105496212Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-vgl6s,Uid:64b71d7c-3082-4d3a-bf73-d4a8def05192,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.106600 kubelet[2906]: E0209 19:28:49.105769    2906 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:49.106600 kubelet[2906]: E0209 19:28:49.105853    2906 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-vgl6s"
Feb  9 19:28:49.106600 kubelet[2906]: E0209 19:28:49.105896    2906 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-vgl6s"
Feb  9 19:28:49.106919 kubelet[2906]: E0209 19:28:49.105971    2906 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-vgl6s_kube-system(64b71d7c-3082-4d3a-bf73-d4a8def05192)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-vgl6s_kube-system(64b71d7c-3082-4d3a-bf73-d4a8def05192)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-vgl6s" podUID=64b71d7c-3082-4d3a-bf73-d4a8def05192
Feb  9 19:28:49.412417 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538-shm.mount: Deactivated successfully.
Feb  9 19:28:49.412639 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b-shm.mount: Deactivated successfully.
Feb  9 19:28:49.988430 kubelet[2906]: I0209 19:28:49.988394    2906 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:28:49.993710 env[1569]: time="2024-02-09T19:28:49.990355188Z" level=info msg="StopPodSandbox for \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\""
Feb  9 19:28:49.994273 kubelet[2906]: I0209 19:28:49.993617    2906 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:28:49.994361 env[1569]: time="2024-02-09T19:28:49.994336292Z" level=info msg="StopPodSandbox for \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\""
Feb  9 19:28:50.003730 kubelet[2906]: I0209 19:28:50.003005    2906 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:28:50.008438 env[1569]: time="2024-02-09T19:28:50.008375963Z" level=info msg="StopPodSandbox for \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\""
Feb  9 19:28:50.010959 kubelet[2906]: I0209 19:28:50.010926    2906 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:28:50.013506 env[1569]: time="2024-02-09T19:28:50.013453699Z" level=info msg="StopPodSandbox for \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\""
Feb  9 19:28:50.139055 env[1569]: time="2024-02-09T19:28:50.138954044Z" level=error msg="StopPodSandbox for \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\" failed" error="failed to destroy network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:50.139717 kubelet[2906]: E0209 19:28:50.139607    2906 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:28:50.140066 kubelet[2906]: E0209 19:28:50.139881    2906 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538}
Feb  9 19:28:50.140066 kubelet[2906]: E0209 19:28:50.139953    2906 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"64b71d7c-3082-4d3a-bf73-d4a8def05192\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Feb  9 19:28:50.140066 kubelet[2906]: E0209 19:28:50.140030    2906 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"64b71d7c-3082-4d3a-bf73-d4a8def05192\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-vgl6s" podUID=64b71d7c-3082-4d3a-bf73-d4a8def05192
Feb  9 19:28:50.168928 env[1569]: time="2024-02-09T19:28:50.168860325Z" level=error msg="StopPodSandbox for \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\" failed" error="failed to destroy network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:50.169854 kubelet[2906]: E0209 19:28:50.169309    2906 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:28:50.169854 kubelet[2906]: E0209 19:28:50.169435    2906 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6}
Feb  9 19:28:50.169854 kubelet[2906]: E0209 19:28:50.169589    2906 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1de46490-a895-43fe-99d1-c548bdb7a466\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Feb  9 19:28:50.169854 kubelet[2906]: E0209 19:28:50.169746    2906 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1de46490-a895-43fe-99d1-c548bdb7a466\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-565445cd7d-48kd5" podUID=1de46490-a895-43fe-99d1-c548bdb7a466
Feb  9 19:28:50.170648 env[1569]: time="2024-02-09T19:28:50.170389062Z" level=error msg="StopPodSandbox for \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\" failed" error="failed to destroy network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:50.171275 kubelet[2906]: E0209 19:28:50.171014    2906 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:28:50.171275 kubelet[2906]: E0209 19:28:50.171067    2906 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b}
Feb  9 19:28:50.171275 kubelet[2906]: E0209 19:28:50.171116    2906 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"30fb5769-46fd-45b8-8cbe-f223e147e943\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Feb  9 19:28:50.171275 kubelet[2906]: E0209 19:28:50.171172    2906 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"30fb5769-46fd-45b8-8cbe-f223e147e943\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-9bcsp" podUID=30fb5769-46fd-45b8-8cbe-f223e147e943
Feb  9 19:28:50.185909 env[1569]: time="2024-02-09T19:28:50.185752671Z" level=error msg="StopPodSandbox for \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\" failed" error="failed to destroy network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 19:28:50.186230 kubelet[2906]: E0209 19:28:50.186207    2906 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:28:50.186380 kubelet[2906]: E0209 19:28:50.186258    2906 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151}
Feb  9 19:28:50.186380 kubelet[2906]: E0209 19:28:50.186309    2906 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Feb  9 19:28:50.186380 kubelet[2906]: E0209 19:28:50.186353    2906 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-swjtr" podUID=cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1
Feb  9 19:28:57.856139 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount536003754.mount: Deactivated successfully.
Feb  9 19:28:57.948561 env[1569]: time="2024-02-09T19:28:57.948512312Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:57.951757 env[1569]: time="2024-02-09T19:28:57.951715734Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:57.954192 env[1569]: time="2024-02-09T19:28:57.954150531Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:57.956997 env[1569]: time="2024-02-09T19:28:57.956947405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:28:57.957530 env[1569]: time="2024-02-09T19:28:57.957444667Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\""
Feb  9 19:28:58.000569 env[1569]: time="2024-02-09T19:28:58.000527980Z" level=info msg="CreateContainer within sandbox \"c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Feb  9 19:28:58.021294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount909929295.mount: Deactivated successfully.
Feb  9 19:28:58.093968 env[1569]: time="2024-02-09T19:28:58.093822471Z" level=info msg="CreateContainer within sandbox \"c86df92d38f5d0ea421be34398b10722964e715925e165923328e277387d60f0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1\""
Feb  9 19:28:58.098677 env[1569]: time="2024-02-09T19:28:58.098632181Z" level=info msg="StartContainer for \"ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1\""
Feb  9 19:28:58.122383 systemd[1]: Started cri-containerd-ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1.scope.
Feb  9 19:28:58.160276 kernel: kauditd_printk_skb: 34 callbacks suppressed
Feb  9 19:28:58.185739 kernel: audit: type=1400 audit(1707506938.153:1203): avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.191845 kernel: audit: type=1300 audit(1707506938.153:1203): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3464 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:58.191937 kernel: audit: type=1327 audit(1707506938.153:1203): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346133613662623537373136383035633135353635336636363865
Feb  9 19:28:58.191971 kernel: audit: type=1400 audit(1707506938.153:1204): avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.192090 kernel: audit: type=1400 audit(1707506938.153:1204): avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.192117 kernel: audit: type=1400 audit(1707506938.153:1204): avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.204870 kernel: audit: type=1400 audit(1707506938.153:1204): avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.204953 kernel: audit: type=1400 audit(1707506938.153:1204): avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3464 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:58.212382 kernel: audit: type=1400 audit(1707506938.153:1204): avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346133613662623537373136383035633135353635336636363865
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.224845 kernel: audit: type=1400 audit(1707506938.153:1204): avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.153000 audit: BPF prog-id=151 op=LOAD
Feb  9 19:28:58.153000 audit[3956]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c000259be0 items=0 ppid=3464 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:58.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346133613662623537373136383035633135353635336636363865
Feb  9 19:28:58.159000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.159000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.159000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.159000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.159000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.159000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.159000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.159000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.159000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.159000 audit: BPF prog-id=152 op=LOAD
Feb  9 19:28:58.159000 audit[3956]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c000259c28 items=0 ppid=3464 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:58.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346133613662623537373136383035633135353635336636363865
Feb  9 19:28:58.166000 audit: BPF prog-id=152 op=UNLOAD
Feb  9 19:28:58.166000 audit: BPF prog-id=151 op=UNLOAD
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { perfmon } for  pid=3956 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit[3956]: AVC avc:  denied  { bpf } for  pid=3956 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:28:58.166000 audit: BPF prog-id=153 op=LOAD
Feb  9 19:28:58.166000 audit[3956]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c000259cb8 items=0 ppid=3464 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:58.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346133613662623537373136383035633135353635336636363865
Feb  9 19:28:58.233802 env[1569]: time="2024-02-09T19:28:58.233728807Z" level=info msg="StartContainer for \"ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1\" returns successfully"
Feb  9 19:28:58.274122 kubelet[2906]: I0209 19:28:58.272695    2906 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness"
Feb  9 19:28:58.511755 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Feb  9 19:28:58.511962 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Feb  9 19:28:58.620000 audit[4021]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:58.620000 audit[4021]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc7eb575e0 a2=0 a3=7ffc7eb575cc items=0 ppid=3117 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:58.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:58.622000 audit[4021]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=4021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:28:58.622000 audit[4021]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffc7eb575e0 a2=0 a3=7ffc7eb575cc items=0 ppid=3117 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:28:58.622000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:28:59.077109 kubelet[2906]: I0209 19:28:59.077063    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tqrtl" podStartSLOduration=-9.223372007783112e+09 pod.CreationTimestamp="2024-02-09 19:28:30 +0000 UTC" firstStartedPulling="2024-02-09 19:28:32.737388566 +0000 UTC m=+23.168385189" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:59.070752688 +0000 UTC m=+49.501749313" watchObservedRunningTime="2024-02-09 19:28:59.071664389 +0000 UTC m=+49.502661016"
Feb  9 19:29:00.095000 audit[4081]: AVC avc:  denied  { write } for  pid=4081 comm="tee" name="fd" dev="proc" ino=26477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 19:29:00.095000 audit[4081]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb8f3096e a2=241 a3=1b6 items=1 ppid=4048 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.095000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Feb  9 19:29:00.095000 audit: PATH item=0 name="/dev/fd/63" inode=26474 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:29:00.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 19:29:00.144000 audit[4087]: AVC avc:  denied  { write } for  pid=4087 comm="tee" name="fd" dev="proc" ino=25268 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 19:29:00.144000 audit[4087]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9631097e a2=241 a3=1b6 items=1 ppid=4061 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.144000 audit: CWD cwd="/etc/service/enabled/bird/log"
Feb  9 19:29:00.144000 audit: PATH item=0 name="/dev/fd/63" inode=26487 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:29:00.144000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 19:29:00.174000 audit[4107]: AVC avc:  denied  { write } for  pid=4107 comm="tee" name="fd" dev="proc" ino=26519 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 19:29:00.182000 audit[4099]: AVC avc:  denied  { write } for  pid=4099 comm="tee" name="fd" dev="proc" ino=25286 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 19:29:00.174000 audit[4107]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8812b97d a2=241 a3=1b6 items=1 ppid=4052 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.174000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Feb  9 19:29:00.174000 audit: PATH item=0 name="/dev/fd/63" inode=25275 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:29:00.174000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 19:29:00.182000 audit[4099]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5c9b397d a2=241 a3=1b6 items=1 ppid=4049 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.182000 audit: CWD cwd="/etc/service/enabled/confd/log"
Feb  9 19:29:00.182000 audit: PATH item=0 name="/dev/fd/63" inode=25272 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:29:00.182000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 19:29:00.205000 audit[4109]: AVC avc:  denied  { write } for  pid=4109 comm="tee" name="fd" dev="proc" ino=26523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 19:29:00.205000 audit[4109]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4a12e96d a2=241 a3=1b6 items=1 ppid=4058 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.205000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Feb  9 19:29:00.205000 audit: PATH item=0 name="/dev/fd/63" inode=25278 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:29:00.205000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 19:29:00.214000 audit[4119]: AVC avc:  denied  { write } for  pid=4119 comm="tee" name="fd" dev="proc" ino=25296 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 19:29:00.214000 audit[4119]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3407e97f a2=241 a3=1b6 items=1 ppid=4055 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.214000 audit: CWD cwd="/etc/service/enabled/cni/log"
Feb  9 19:29:00.214000 audit: PATH item=0 name="/dev/fd/63" inode=26511 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:29:00.214000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 19:29:00.233000 audit[4136]: AVC avc:  denied  { write } for  pid=4136 comm="tee" name="fd" dev="proc" ino=26549 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 19:29:00.233000 audit[4136]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd09ff097d a2=241 a3=1b6 items=1 ppid=4082 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.233000 audit: CWD cwd="/etc/service/enabled/felix/log"
Feb  9 19:29:00.233000 audit: PATH item=0 name="/dev/fd/63" inode=26546 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 19:29:00.233000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 19:29:00.917471 (udev-worker)[3989]: Network interface NamePolicy= disabled on kernel command line.
Feb  9 19:29:00.918343 (udev-worker)[3990]: Network interface NamePolicy= disabled on kernel command line.
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit: BPF prog-id=154 op=LOAD
Feb  9 19:29:00.922000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2e8775d0 a2=70 a3=7efc9a4f4000 items=0 ppid=4083 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 19:29:00.922000 audit: BPF prog-id=154 op=UNLOAD
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit: BPF prog-id=155 op=LOAD
Feb  9 19:29:00.922000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2e8775d0 a2=70 a3=6e items=0 ppid=4083 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 19:29:00.922000 audit: BPF prog-id=155 op=UNLOAD
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd2e877580 a2=70 a3=7ffd2e8775d0 items=0 ppid=4083 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit: BPF prog-id=156 op=LOAD
Feb  9 19:29:00.922000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd2e877560 a2=70 a3=7ffd2e8775d0 items=0 ppid=4083 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 19:29:00.922000 audit: BPF prog-id=156 op=UNLOAD
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2e877640 a2=70 a3=0 items=0 ppid=4083 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2e877630 a2=70 a3=0 items=0 ppid=4083 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 19:29:00.922000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.922000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd2e877670 a2=70 a3=0 items=0 ppid=4083 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { perfmon } for  pid=4210 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit[4210]: AVC avc:  denied  { bpf } for  pid=4210 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.923000 audit: BPF prog-id=157 op=LOAD
Feb  9 19:29:00.923000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd2e877590 a2=70 a3=ffffffff items=0 ppid=4083 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.923000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 19:29:00.932000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.932000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc42fe2590 a2=70 a3=fff80800 items=0 ppid=4083 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.932000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Feb  9 19:29:00.932000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:00.932000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc42fe2460 a2=70 a3=3 items=0 ppid=4083 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:00.932000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Feb  9 19:29:00.941000 audit: BPF prog-id=157 op=UNLOAD
Feb  9 19:29:01.061000 audit[4236]: NETFILTER_CFG table=raw:111 family=2 entries=19 op=nft_register_chain pid=4236 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:29:01.061000 audit[4236]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffcc004e850 a2=0 a3=7ffcc004e83c items=0 ppid=4083 pid=4236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:01.061000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:29:01.072000 audit[4237]: NETFILTER_CFG table=nat:112 family=2 entries=16 op=nft_register_chain pid=4237 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:29:01.072000 audit[4237]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff27f8d2e0 a2=0 a3=560cc956d000 items=0 ppid=4083 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:01.072000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:29:01.073000 audit[4238]: NETFILTER_CFG table=mangle:113 family=2 entries=19 op=nft_register_chain pid=4238 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:29:01.085278 systemd[1]: run-containerd-runc-k8s.io-ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1-runc.FxDSgo.mount: Deactivated successfully.
Feb  9 19:29:01.085000 audit[4239]: NETFILTER_CFG table=filter:114 family=2 entries=39 op=nft_register_chain pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:29:01.085000 audit[4239]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe289e0640 a2=0 a3=5566b07fc000 items=0 ppid=4083 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:01.085000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:29:01.073000 audit[4238]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd8cb57f30 a2=0 a3=55d7a699d000 items=0 ppid=4083 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:01.073000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:29:01.798219 systemd-networkd[1376]: vxlan.calico: Link UP
Feb  9 19:29:01.798229 systemd-networkd[1376]: vxlan.calico: Gained carrier
Feb  9 19:29:02.813762 env[1569]: time="2024-02-09T19:29:02.813722614Z" level=info msg="StopPodSandbox for \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\""
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:02.951 [INFO][4288] k8s.go 578: Cleaning up netns ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:02.952 [INFO][4288] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" iface="eth0" netns="/var/run/netns/cni-fe97e7be-ff6f-7de6-d939-7857b56fb917"
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:02.953 [INFO][4288] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" iface="eth0" netns="/var/run/netns/cni-fe97e7be-ff6f-7de6-d939-7857b56fb917"
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:02.956 [INFO][4288] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" iface="eth0" netns="/var/run/netns/cni-fe97e7be-ff6f-7de6-d939-7857b56fb917"
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:02.956 [INFO][4288] k8s.go 585: Releasing IP address(es) ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:02.956 [INFO][4288] utils.go 188: Calico CNI releasing IP address ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:03.285 [INFO][4294] ipam_plugin.go 415: Releasing address using handleID ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" HandleID="k8s-pod-network.857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:03.290 [INFO][4294] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:03.290 [INFO][4294] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:03.309 [WARNING][4294] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" HandleID="k8s-pod-network.857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:03.309 [INFO][4294] ipam_plugin.go 443: Releasing address using workloadID ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" HandleID="k8s-pod-network.857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:03.312 [INFO][4294] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:03.318097 env[1569]: 2024-02-09 19:29:03.314 [INFO][4288] k8s.go 591: Teardown processing complete. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:03.327525 env[1569]: time="2024-02-09T19:29:03.318502815Z" level=info msg="TearDown network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\" successfully"
Feb  9 19:29:03.327525 env[1569]: time="2024-02-09T19:29:03.318543515Z" level=info msg="StopPodSandbox for \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\" returns successfully"
Feb  9 19:29:03.327525 env[1569]: time="2024-02-09T19:29:03.319614445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-swjtr,Uid:cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1,Namespace:calico-system,Attempt:1,}"
Feb  9 19:29:03.322538 systemd[1]: run-netns-cni\x2dfe97e7be\x2dff6f\x2d7de6\x2dd939\x2d7857b56fb917.mount: Deactivated successfully.
Feb  9 19:29:03.555801 systemd-networkd[1376]: cali54b429bfc0a: Link UP
Feb  9 19:29:03.556329 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 19:29:03.556380 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali54b429bfc0a: link becomes ready
Feb  9 19:29:03.557982 systemd-networkd[1376]: cali54b429bfc0a: Gained carrier
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.409 [INFO][4301] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0 csi-node-driver- calico-system  cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1 684 0 2024-02-09 19:28:30 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  ip-172-31-21-113  csi-node-driver-swjtr eth0 default [] []   [kns.calico-system ksa.calico-system.default] cali54b429bfc0a  [] []}} ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Namespace="calico-system" Pod="csi-node-driver-swjtr" WorkloadEndpoint="ip--172--31--21--113-k8s-csi--node--driver--swjtr-"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.410 [INFO][4301] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Namespace="calico-system" Pod="csi-node-driver-swjtr" WorkloadEndpoint="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.480 [INFO][4311] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" HandleID="k8s-pod-network.445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.492 [INFO][4311] ipam_plugin.go 268: Auto assigning IP ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" HandleID="k8s-pod-network.445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-113", "pod":"csi-node-driver-swjtr", "timestamp":"2024-02-09 19:29:03.479998743 +0000 UTC"}, Hostname:"ip-172-31-21-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.492 [INFO][4311] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.492 [INFO][4311] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.492 [INFO][4311] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-113'
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.498 [INFO][4311] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" host="ip-172-31-21-113"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.509 [INFO][4311] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-113"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.517 [INFO][4311] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.524 [INFO][4311] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.529 [INFO][4311] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.529 [INFO][4311] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" host="ip-172-31-21-113"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.533 [INFO][4311] ipam.go 1682: Creating new handle: k8s-pod-network.445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.538 [INFO][4311] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" host="ip-172-31-21-113"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.543 [INFO][4311] ipam.go 1216: Successfully claimed IPs: [192.168.121.65/26] block=192.168.121.64/26 handle="k8s-pod-network.445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" host="ip-172-31-21-113"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.544 [INFO][4311] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.65/26] handle="k8s-pod-network.445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" host="ip-172-31-21-113"
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.544 [INFO][4311] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:03.590022 env[1569]: 2024-02-09 19:29:03.544 [INFO][4311] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.65/26] IPv6=[] ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" HandleID="k8s-pod-network.445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.594211 env[1569]: 2024-02-09 19:29:03.548 [INFO][4301] k8s.go 385: Populated endpoint ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Namespace="calico-system" Pod="csi-node-driver-swjtr" WorkloadEndpoint="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1", ResourceVersion:"684", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"", Pod:"csi-node-driver-swjtr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali54b429bfc0a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:03.594211 env[1569]: 2024-02-09 19:29:03.548 [INFO][4301] k8s.go 386: Calico CNI using IPs: [192.168.121.65/32] ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Namespace="calico-system" Pod="csi-node-driver-swjtr" WorkloadEndpoint="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.594211 env[1569]: 2024-02-09 19:29:03.548 [INFO][4301] dataplane_linux.go 68: Setting the host side veth name to cali54b429bfc0a ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Namespace="calico-system" Pod="csi-node-driver-swjtr" WorkloadEndpoint="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.594211 env[1569]: 2024-02-09 19:29:03.566 [INFO][4301] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Namespace="calico-system" Pod="csi-node-driver-swjtr" WorkloadEndpoint="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.594211 env[1569]: 2024-02-09 19:29:03.566 [INFO][4301] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Namespace="calico-system" Pod="csi-node-driver-swjtr" WorkloadEndpoint="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1", ResourceVersion:"684", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134", Pod:"csi-node-driver-swjtr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali54b429bfc0a", MAC:"5a:59:9e:c7:5d:32", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:03.594211 env[1569]: 2024-02-09 19:29:03.586 [INFO][4301] k8s.go 491: Wrote updated endpoint to datastore ContainerID="445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134" Namespace="calico-system" Pod="csi-node-driver-swjtr" WorkloadEndpoint="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:03.616749 env[1569]: time="2024-02-09T19:29:03.615512114Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:29:03.616749 env[1569]: time="2024-02-09T19:29:03.615561279Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:29:03.616749 env[1569]: time="2024-02-09T19:29:03.615576830Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:29:03.616749 env[1569]: time="2024-02-09T19:29:03.615763018Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134 pid=4335 runtime=io.containerd.runc.v2
Feb  9 19:29:03.650798 systemd[1]: Started cri-containerd-445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134.scope.
Feb  9 19:29:03.722063 systemd-networkd[1376]: vxlan.calico: Gained IPv6LL
Feb  9 19:29:03.814008 env[1569]: time="2024-02-09T19:29:03.813240836Z" level=info msg="StopPodSandbox for \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\""
Feb  9 19:29:03.850250 kernel: kauditd_printk_skb: 157 callbacks suppressed
Feb  9 19:29:03.850426 kernel: audit: type=1400 audit(1707506943.835:1236): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850466 kernel: audit: type=1400 audit(1707506943.835:1237): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.835000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.835000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.835000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.867339 kernel: audit: type=1400 audit(1707506943.835:1238): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.877785 kernel: audit: type=1400 audit(1707506943.835:1239): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.885157 kernel: audit: type=1400 audit(1707506943.835:1240): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.896006 kernel: audit: type=1400 audit(1707506943.835:1241): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.931545 kernel: audit: type=1400 audit(1707506943.835:1242): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.948716 kernel: audit: type=1400 audit(1707506943.835:1243): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.835000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.962346 kernel: audit: type=1400 audit(1707506943.835:1244): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.962478 kernel: audit: type=1400 audit(1707506943.849:1245): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.849000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.849000 audit: BPF prog-id=158 op=LOAD
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4335 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:03.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353530363038396338356464383430643863343238353533636266
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4335 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:03.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353530363038396338356464383430643863343238353533636266
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit: BPF prog-id=159 op=LOAD
Feb  9 19:29:03.850000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001851d0 items=0 ppid=4335 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:03.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353530363038396338356464383430643863343238353533636266
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit: BPF prog-id=160 op=LOAD
Feb  9 19:29:03.850000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185218 items=0 ppid=4335 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:03.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353530363038396338356464383430643863343238353533636266
Feb  9 19:29:03.850000 audit: BPF prog-id=160 op=UNLOAD
Feb  9 19:29:03.850000 audit: BPF prog-id=159 op=UNLOAD
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { perfmon } for  pid=4346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit[4346]: AVC avc:  denied  { bpf } for  pid=4346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:03.850000 audit: BPF prog-id=161 op=LOAD
Feb  9 19:29:03.850000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185628 items=0 ppid=4335 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:03.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353530363038396338356464383430643863343238353533636266
Feb  9 19:29:03.963000 audit[4385]: NETFILTER_CFG table=filter:115 family=2 entries=36 op=nft_register_chain pid=4385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:29:03.963000 audit[4385]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffcec9b7630 a2=0 a3=7ffcec9b761c items=0 ppid=4083 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:03.963000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:29:03.984073 env[1569]: time="2024-02-09T19:29:03.984027233Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-swjtr,Uid:cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1,Namespace:calico-system,Attempt:1,} returns sandbox id \"445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134\""
Feb  9 19:29:03.988709 env[1569]: time="2024-02-09T19:29:03.986665755Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\""
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.002 [INFO][4379] k8s.go 578: Cleaning up netns ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.002 [INFO][4379] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" iface="eth0" netns="/var/run/netns/cni-0a92b5a2-6f32-859c-1fbc-c038e245830c"
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.002 [INFO][4379] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" iface="eth0" netns="/var/run/netns/cni-0a92b5a2-6f32-859c-1fbc-c038e245830c"
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.003 [INFO][4379] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" iface="eth0" netns="/var/run/netns/cni-0a92b5a2-6f32-859c-1fbc-c038e245830c"
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.003 [INFO][4379] k8s.go 585: Releasing IP address(es) ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.003 [INFO][4379] utils.go 188: Calico CNI releasing IP address ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.065 [INFO][4392] ipam_plugin.go 415: Releasing address using handleID ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" HandleID="k8s-pod-network.4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.065 [INFO][4392] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.065 [INFO][4392] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.075 [WARNING][4392] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" HandleID="k8s-pod-network.4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.075 [INFO][4392] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" HandleID="k8s-pod-network.4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.077 [INFO][4392] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:04.082643 env[1569]: 2024-02-09 19:29:04.080 [INFO][4379] k8s.go 591: Teardown processing complete. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:04.083490 env[1569]: time="2024-02-09T19:29:04.083445942Z" level=info msg="TearDown network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\" successfully"
Feb  9 19:29:04.083671 env[1569]: time="2024-02-09T19:29:04.083491067Z" level=info msg="StopPodSandbox for \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\" returns successfully"
Feb  9 19:29:04.086810 env[1569]: time="2024-02-09T19:29:04.086719308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565445cd7d-48kd5,Uid:1de46490-a895-43fe-99d1-c548bdb7a466,Namespace:calico-system,Attempt:1,}"
Feb  9 19:29:04.329000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:04.329000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:04.329000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0012240c0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:29:04.329000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:29:04.329000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00147b280 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:29:04.329000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:29:04.332000 systemd[1]: run-containerd-runc-k8s.io-445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134-runc.8Q57zA.mount: Deactivated successfully.
Feb  9 19:29:04.332280 systemd[1]: run-netns-cni\x2d0a92b5a2\x2d6f32\x2d859c\x2d1fbc\x2dc038e245830c.mount: Deactivated successfully.
Feb  9 19:29:04.363511 systemd-networkd[1376]: cali68ed0b3c13c: Link UP
Feb  9 19:29:04.366518 systemd-networkd[1376]: cali68ed0b3c13c: Gained carrier
Feb  9 19:29:04.366722 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali68ed0b3c13c: link becomes ready
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.180 [INFO][4398] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0 calico-kube-controllers-565445cd7d- calico-system  1de46490-a895-43fe-99d1-c548bdb7a466 692 0 2024-02-09 19:28:30 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:565445cd7d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s  ip-172-31-21-113  calico-kube-controllers-565445cd7d-48kd5 eth0 calico-kube-controllers [] []   [kns.calico-system ksa.calico-system.calico-kube-controllers] cali68ed0b3c13c  [] []}} ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Namespace="calico-system" Pod="calico-kube-controllers-565445cd7d-48kd5" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.180 [INFO][4398] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Namespace="calico-system" Pod="calico-kube-controllers-565445cd7d-48kd5" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.283 [INFO][4409] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" HandleID="k8s-pod-network.8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.299 [INFO][4409] ipam_plugin.go 268: Auto assigning IP ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" HandleID="k8s-pod-network.8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bfac0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-113", "pod":"calico-kube-controllers-565445cd7d-48kd5", "timestamp":"2024-02-09 19:29:04.283921759 +0000 UTC"}, Hostname:"ip-172-31-21-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.299 [INFO][4409] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.299 [INFO][4409] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.299 [INFO][4409] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-113'
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.302 [INFO][4409] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" host="ip-172-31-21-113"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.312 [INFO][4409] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-113"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.326 [INFO][4409] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.336 [INFO][4409] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.340 [INFO][4409] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.340 [INFO][4409] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" host="ip-172-31-21-113"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.342 [INFO][4409] ipam.go 1682: Creating new handle: k8s-pod-network.8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.350 [INFO][4409] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" host="ip-172-31-21-113"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.356 [INFO][4409] ipam.go 1216: Successfully claimed IPs: [192.168.121.66/26] block=192.168.121.64/26 handle="k8s-pod-network.8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" host="ip-172-31-21-113"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.356 [INFO][4409] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.66/26] handle="k8s-pod-network.8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" host="ip-172-31-21-113"
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.356 [INFO][4409] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:04.390463 env[1569]: 2024-02-09 19:29:04.356 [INFO][4409] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.66/26] IPv6=[] ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" HandleID="k8s-pod-network.8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.392042 env[1569]: 2024-02-09 19:29:04.359 [INFO][4398] k8s.go 385: Populated endpoint ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Namespace="calico-system" Pod="calico-kube-controllers-565445cd7d-48kd5" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0", GenerateName:"calico-kube-controllers-565445cd7d-", Namespace:"calico-system", SelfLink:"", UID:"1de46490-a895-43fe-99d1-c548bdb7a466", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565445cd7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"", Pod:"calico-kube-controllers-565445cd7d-48kd5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.121.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali68ed0b3c13c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:04.392042 env[1569]: 2024-02-09 19:29:04.359 [INFO][4398] k8s.go 386: Calico CNI using IPs: [192.168.121.66/32] ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Namespace="calico-system" Pod="calico-kube-controllers-565445cd7d-48kd5" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.392042 env[1569]: 2024-02-09 19:29:04.359 [INFO][4398] dataplane_linux.go 68: Setting the host side veth name to cali68ed0b3c13c ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Namespace="calico-system" Pod="calico-kube-controllers-565445cd7d-48kd5" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.392042 env[1569]: 2024-02-09 19:29:04.367 [INFO][4398] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Namespace="calico-system" Pod="calico-kube-controllers-565445cd7d-48kd5" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.392042 env[1569]: 2024-02-09 19:29:04.368 [INFO][4398] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Namespace="calico-system" Pod="calico-kube-controllers-565445cd7d-48kd5" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0", GenerateName:"calico-kube-controllers-565445cd7d-", Namespace:"calico-system", SelfLink:"", UID:"1de46490-a895-43fe-99d1-c548bdb7a466", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565445cd7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c", Pod:"calico-kube-controllers-565445cd7d-48kd5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.121.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali68ed0b3c13c", MAC:"4a:30:10:ec:a8:ce", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:04.392042 env[1569]: 2024-02-09 19:29:04.386 [INFO][4398] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c" Namespace="calico-system" Pod="calico-kube-controllers-565445cd7d-48kd5" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:04.421171 env[1569]: time="2024-02-09T19:29:04.421068087Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:29:04.421349 env[1569]: time="2024-02-09T19:29:04.421210077Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:29:04.421349 env[1569]: time="2024-02-09T19:29:04.421241456Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:29:04.421480 env[1569]: time="2024-02-09T19:29:04.421432946Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c pid=4432 runtime=io.containerd.runc.v2
Feb  9 19:29:04.465833 systemd[1]: Started cri-containerd-8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c.scope.
Feb  9 19:29:04.485000 audit[4452]: NETFILTER_CFG table=filter:116 family=2 entries=34 op=nft_register_chain pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:29:04.485000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=18320 a0=3 a1=7fffc3fc9fe0 a2=0 a3=7fffc3fc9fcc items=0 ppid=4083 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:04.485000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.510000 audit: BPF prog-id=162 op=LOAD
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4432 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:04.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646533663336613633626562313735613861303031643862383261
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4432 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:04.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646533663336613633626562313735613861303031643862383261
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit: BPF prog-id=163 op=LOAD
Feb  9 19:29:04.511000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025f810 items=0 ppid=4432 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:04.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646533663336613633626562313735613861303031643862383261
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit: BPF prog-id=164 op=LOAD
Feb  9 19:29:04.511000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025f858 items=0 ppid=4432 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:04.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646533663336613633626562313735613861303031643862383261
Feb  9 19:29:04.511000 audit: BPF prog-id=164 op=UNLOAD
Feb  9 19:29:04.511000 audit: BPF prog-id=163 op=UNLOAD
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { perfmon } for  pid=4443 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit[4443]: AVC avc:  denied  { bpf } for  pid=4443 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:04.511000 audit: BPF prog-id=165 op=LOAD
Feb  9 19:29:04.511000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00025fc68 items=0 ppid=4432 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:04.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646533663336613633626562313735613861303031643862383261
Feb  9 19:29:04.566718 env[1569]: time="2024-02-09T19:29:04.566649560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565445cd7d-48kd5,Uid:1de46490-a895-43fe-99d1-c548bdb7a466,Namespace:calico-system,Attempt:1,} returns sandbox id \"8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c\""
Feb  9 19:29:04.817642 env[1569]: time="2024-02-09T19:29:04.817593315Z" level=info msg="StopPodSandbox for \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\""
Feb  9 19:29:04.822041 env[1569]: time="2024-02-09T19:29:04.821913765Z" level=info msg="StopPodSandbox for \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\""
Feb  9 19:29:04.921198 systemd-networkd[1376]: cali54b429bfc0a: Gained IPv6LL
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:04.973 [INFO][4501] k8s.go 578: Cleaning up netns ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:04.974 [INFO][4501] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" iface="eth0" netns="/var/run/netns/cni-6b856724-0c27-61e0-4950-c144925b673c"
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:04.974 [INFO][4501] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" iface="eth0" netns="/var/run/netns/cni-6b856724-0c27-61e0-4950-c144925b673c"
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:04.974 [INFO][4501] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" iface="eth0" netns="/var/run/netns/cni-6b856724-0c27-61e0-4950-c144925b673c"
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:04.975 [INFO][4501] k8s.go 585: Releasing IP address(es) ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:04.975 [INFO][4501] utils.go 188: Calico CNI releasing IP address ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:05.161 [INFO][4507] ipam_plugin.go 415: Releasing address using handleID ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" HandleID="k8s-pod-network.377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:05.161 [INFO][4507] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:05.162 [INFO][4507] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:05.187 [WARNING][4507] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" HandleID="k8s-pod-network.377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:05.187 [INFO][4507] ipam_plugin.go 443: Releasing address using workloadID ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" HandleID="k8s-pod-network.377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:05.193 [INFO][4507] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:05.196783 env[1569]: 2024-02-09 19:29:05.194 [INFO][4501] k8s.go 591: Teardown processing complete. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:05.206024 systemd[1]: run-netns-cni\x2d6b856724\x2d0c27\x2d61e0\x2d4950\x2dc144925b673c.mount: Deactivated successfully.
Feb  9 19:29:05.208600 env[1569]: time="2024-02-09T19:29:05.208448711Z" level=info msg="TearDown network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\" successfully"
Feb  9 19:29:05.208799 env[1569]: time="2024-02-09T19:29:05.208774662Z" level=info msg="StopPodSandbox for \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\" returns successfully"
Feb  9 19:29:05.211220 env[1569]: time="2024-02-09T19:29:05.211182522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9bcsp,Uid:30fb5769-46fd-45b8-8cbe-f223e147e943,Namespace:kube-system,Attempt:1,}"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.216 [INFO][4489] k8s.go 578: Cleaning up netns ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.217 [INFO][4489] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" iface="eth0" netns="/var/run/netns/cni-812880a2-1db7-b811-0f90-7e0dc2522954"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.217 [INFO][4489] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" iface="eth0" netns="/var/run/netns/cni-812880a2-1db7-b811-0f90-7e0dc2522954"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.217 [INFO][4489] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" iface="eth0" netns="/var/run/netns/cni-812880a2-1db7-b811-0f90-7e0dc2522954"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.217 [INFO][4489] k8s.go 585: Releasing IP address(es) ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.217 [INFO][4489] utils.go 188: Calico CNI releasing IP address ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.345 [INFO][4516] ipam_plugin.go 415: Releasing address using handleID ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" HandleID="k8s-pod-network.9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.346 [INFO][4516] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.346 [INFO][4516] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.403 [WARNING][4516] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" HandleID="k8s-pod-network.9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.405 [INFO][4516] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" HandleID="k8s-pod-network.9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.413 [INFO][4516] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:05.431347 env[1569]: 2024-02-09 19:29:05.416 [INFO][4489] k8s.go 591: Teardown processing complete. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:05.431347 env[1569]: time="2024-02-09T19:29:05.423504536Z" level=info msg="TearDown network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\" successfully"
Feb  9 19:29:05.431347 env[1569]: time="2024-02-09T19:29:05.423544092Z" level=info msg="StopPodSandbox for \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\" returns successfully"
Feb  9 19:29:05.431347 env[1569]: time="2024-02-09T19:29:05.424280139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-vgl6s,Uid:64b71d7c-3082-4d3a-bf73-d4a8def05192,Namespace:kube-system,Attempt:1,}"
Feb  9 19:29:05.426894 systemd[1]: run-netns-cni\x2d812880a2\x2d1db7\x2db811\x2d0f90\x2d7e0dc2522954.mount: Deactivated successfully.
Feb  9 19:29:05.765598 systemd-networkd[1376]: califa9af4919e0: Link UP
Feb  9 19:29:05.775913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 19:29:05.776046 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califa9af4919e0: link becomes ready
Feb  9 19:29:05.779785 systemd-networkd[1376]: califa9af4919e0: Gained carrier
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.396 [INFO][4522] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0 coredns-787d4945fb- kube-system  30fb5769-46fd-45b8-8cbe-f223e147e943 700 0 2024-02-09 19:28:23 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s  ip-172-31-21-113  coredns-787d4945fb-9bcsp eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] califa9af4919e0  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Namespace="kube-system" Pod="coredns-787d4945fb-9bcsp" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.402 [INFO][4522] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Namespace="kube-system" Pod="coredns-787d4945fb-9bcsp" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.609 [INFO][4533] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" HandleID="k8s-pod-network.349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.639 [INFO][4533] ipam_plugin.go 268: Auto assigning IP ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" HandleID="k8s-pod-network.349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c5ff0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-113", "pod":"coredns-787d4945fb-9bcsp", "timestamp":"2024-02-09 19:29:05.609305904 +0000 UTC"}, Hostname:"ip-172-31-21-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.639 [INFO][4533] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.639 [INFO][4533] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.639 [INFO][4533] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-113'
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.642 [INFO][4533] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" host="ip-172-31-21-113"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.648 [INFO][4533] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-113"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.654 [INFO][4533] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.657 [INFO][4533] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.664 [INFO][4533] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.664 [INFO][4533] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" host="ip-172-31-21-113"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.672 [INFO][4533] ipam.go 1682: Creating new handle: k8s-pod-network.349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.711 [INFO][4533] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" host="ip-172-31-21-113"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.737 [INFO][4533] ipam.go 1216: Successfully claimed IPs: [192.168.121.67/26] block=192.168.121.64/26 handle="k8s-pod-network.349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" host="ip-172-31-21-113"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.737 [INFO][4533] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.67/26] handle="k8s-pod-network.349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" host="ip-172-31-21-113"
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.737 [INFO][4533] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:05.809017 env[1569]: 2024-02-09 19:29:05.737 [INFO][4533] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.67/26] IPv6=[] ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" HandleID="k8s-pod-network.349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.810285 env[1569]: 2024-02-09 19:29:05.745 [INFO][4522] k8s.go 385: Populated endpoint ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Namespace="kube-system" Pod="coredns-787d4945fb-9bcsp" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"30fb5769-46fd-45b8-8cbe-f223e147e943", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"", Pod:"coredns-787d4945fb-9bcsp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califa9af4919e0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:05.810285 env[1569]: 2024-02-09 19:29:05.746 [INFO][4522] k8s.go 386: Calico CNI using IPs: [192.168.121.67/32] ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Namespace="kube-system" Pod="coredns-787d4945fb-9bcsp" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.810285 env[1569]: 2024-02-09 19:29:05.746 [INFO][4522] dataplane_linux.go 68: Setting the host side veth name to califa9af4919e0 ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Namespace="kube-system" Pod="coredns-787d4945fb-9bcsp" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.810285 env[1569]: 2024-02-09 19:29:05.776 [INFO][4522] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Namespace="kube-system" Pod="coredns-787d4945fb-9bcsp" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.810285 env[1569]: 2024-02-09 19:29:05.776 [INFO][4522] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Namespace="kube-system" Pod="coredns-787d4945fb-9bcsp" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"30fb5769-46fd-45b8-8cbe-f223e147e943", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c", Pod:"coredns-787d4945fb-9bcsp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califa9af4919e0", MAC:"22:d0:2b:e8:5b:95", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:05.810285 env[1569]: 2024-02-09 19:29:05.800 [INFO][4522] k8s.go 491: Wrote updated endpoint to datastore ContainerID="349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c" Namespace="kube-system" Pod="coredns-787d4945fb-9bcsp" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:05.963151 env[1569]: time="2024-02-09T19:29:05.963041599Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:29:05.963773 env[1569]: time="2024-02-09T19:29:05.963162317Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:29:05.963773 env[1569]: time="2024-02-09T19:29:05.963368212Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:29:05.964412 env[1569]: time="2024-02-09T19:29:05.964335029Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c pid=4576 runtime=io.containerd.runc.v2
Feb  9 19:29:06.015711 systemd[1]: Started cri-containerd-349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c.scope.
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.119000 audit: BPF prog-id=166 op=LOAD
Feb  9 19:29:06.123000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.123000 audit[4587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4576 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396261393162366561373330386263383738633835333137363864
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4576 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396261393162366561373330386263383738633835333137363864
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit: BPF prog-id=167 op=LOAD
Feb  9 19:29:06.124000 audit[4587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000025b70 items=0 ppid=4576 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396261393162366561373330386263383738633835333137363864
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.124000 audit: BPF prog-id=168 op=LOAD
Feb  9 19:29:06.124000 audit[4587]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000025bb8 items=0 ppid=4576 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396261393162366561373330386263383738633835333137363864
Feb  9 19:29:06.127000 audit: BPF prog-id=168 op=UNLOAD
Feb  9 19:29:06.128000 audit: BPF prog-id=167 op=UNLOAD
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { perfmon } for  pid=4587 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit[4587]: AVC avc:  denied  { bpf } for  pid=4587 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.128000 audit: BPF prog-id=169 op=LOAD
Feb  9 19:29:06.128000 audit[4587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000025fc8 items=0 ppid=4576 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396261393162366561373330386263383738633835333137363864
Feb  9 19:29:06.139746 systemd-networkd[1376]: cali829a776ec66: Link UP
Feb  9 19:29:06.153029 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali829a776ec66: link becomes ready
Feb  9 19:29:06.150745 systemd-networkd[1376]: cali829a776ec66: Gained carrier
Feb  9 19:29:06.192000 audit[4606]: NETFILTER_CFG table=filter:117 family=2 entries=44 op=nft_register_chain pid=4606 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:29:06.192000 audit[4606]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffd90ab59b0 a2=0 a3=7ffd90ab599c items=0 ppid=4083 pid=4606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.192000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:05.713 [INFO][4537] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0 coredns-787d4945fb- kube-system  64b71d7c-3082-4d3a-bf73-d4a8def05192 701 0 2024-02-09 19:28:23 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s  ip-172-31-21-113  coredns-787d4945fb-vgl6s eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] cali829a776ec66  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Namespace="kube-system" Pod="coredns-787d4945fb-vgl6s" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:05.714 [INFO][4537] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Namespace="kube-system" Pod="coredns-787d4945fb-vgl6s" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:05.953 [INFO][4553] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" HandleID="k8s-pod-network.8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.051 [INFO][4553] ipam_plugin.go 268: Auto assigning IP ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" HandleID="k8s-pod-network.8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-113", "pod":"coredns-787d4945fb-vgl6s", "timestamp":"2024-02-09 19:29:05.948105245 +0000 UTC"}, Hostname:"ip-172-31-21-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.052 [INFO][4553] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.052 [INFO][4553] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.052 [INFO][4553] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-113'
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.056 [INFO][4553] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" host="ip-172-31-21-113"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.078 [INFO][4553] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-113"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.084 [INFO][4553] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.094 [INFO][4553] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.100 [INFO][4553] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.100 [INFO][4553] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" host="ip-172-31-21-113"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.103 [INFO][4553] ipam.go 1682: Creating new handle: k8s-pod-network.8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.109 [INFO][4553] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" host="ip-172-31-21-113"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.121 [INFO][4553] ipam.go 1216: Successfully claimed IPs: [192.168.121.68/26] block=192.168.121.64/26 handle="k8s-pod-network.8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" host="ip-172-31-21-113"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.121 [INFO][4553] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.68/26] handle="k8s-pod-network.8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" host="ip-172-31-21-113"
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.121 [INFO][4553] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:06.225213 env[1569]: 2024-02-09 19:29:06.121 [INFO][4553] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.68/26] IPv6=[] ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" HandleID="k8s-pod-network.8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:06.227673 env[1569]: 2024-02-09 19:29:06.125 [INFO][4537] k8s.go 385: Populated endpoint ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Namespace="kube-system" Pod="coredns-787d4945fb-vgl6s" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"64b71d7c-3082-4d3a-bf73-d4a8def05192", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"", Pod:"coredns-787d4945fb-vgl6s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali829a776ec66", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:06.227673 env[1569]: 2024-02-09 19:29:06.125 [INFO][4537] k8s.go 386: Calico CNI using IPs: [192.168.121.68/32] ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Namespace="kube-system" Pod="coredns-787d4945fb-vgl6s" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:06.227673 env[1569]: 2024-02-09 19:29:06.125 [INFO][4537] dataplane_linux.go 68: Setting the host side veth name to cali829a776ec66 ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Namespace="kube-system" Pod="coredns-787d4945fb-vgl6s" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:06.227673 env[1569]: 2024-02-09 19:29:06.152 [INFO][4537] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Namespace="kube-system" Pod="coredns-787d4945fb-vgl6s" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:06.227673 env[1569]: 2024-02-09 19:29:06.165 [INFO][4537] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Namespace="kube-system" Pod="coredns-787d4945fb-vgl6s" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"64b71d7c-3082-4d3a-bf73-d4a8def05192", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a", Pod:"coredns-787d4945fb-vgl6s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali829a776ec66", MAC:"f2:c7:9a:70:99:30", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:06.227673 env[1569]: 2024-02-09 19:29:06.222 [INFO][4537] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a" Namespace="kube-system" Pod="coredns-787d4945fb-vgl6s" WorkloadEndpoint="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:06.275000 audit[4629]: NETFILTER_CFG table=filter:118 family=2 entries=38 op=nft_register_chain pid=4629 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:29:06.275000 audit[4629]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7fff65e2acd0 a2=0 a3=7fff65e2acbc items=0 ppid=4083 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.275000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:29:06.279620 systemd-networkd[1376]: cali68ed0b3c13c: Gained IPv6LL
Feb  9 19:29:06.294000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:06.294000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0055e8000 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:29:06.294000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:29:06.296000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:06.296000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c017299780 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:29:06.296000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:29:06.296000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:06.296000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c002587710 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:29:06.296000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:29:06.304000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:06.304000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0055e80c0 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:29:06.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:29:06.305000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:06.305000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0172997a0 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:29:06.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:29:06.305000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:06.305000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0055e81e0 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:29:06.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:29:06.355063 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2530620986.mount: Deactivated successfully.
Feb  9 19:29:06.409753 env[1569]: time="2024-02-09T19:29:06.406294465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9bcsp,Uid:30fb5769-46fd-45b8-8cbe-f223e147e943,Namespace:kube-system,Attempt:1,} returns sandbox id \"349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c\""
Feb  9 19:29:06.427881 env[1569]: time="2024-02-09T19:29:06.410847149Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:29:06.427881 env[1569]: time="2024-02-09T19:29:06.410909037Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:29:06.427881 env[1569]: time="2024-02-09T19:29:06.410926521Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:29:06.427881 env[1569]: time="2024-02-09T19:29:06.411246350Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a pid=4637 runtime=io.containerd.runc.v2
Feb  9 19:29:06.443040 env[1569]: time="2024-02-09T19:29:06.438611323Z" level=info msg="CreateContainer within sandbox \"349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Feb  9 19:29:06.446987 systemd[1]: Started cri-containerd-8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a.scope.
Feb  9 19:29:06.476021 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1887567061.mount: Deactivated successfully.
Feb  9 19:29:06.513486 env[1569]: time="2024-02-09T19:29:06.513427999Z" level=info msg="CreateContainer within sandbox \"349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c7033fb59fff0d269309a24487427cbb52c09796e9cf5dbba3cbeeedacfc48e7\""
Feb  9 19:29:06.518563 env[1569]: time="2024-02-09T19:29:06.518514634Z" level=info msg="StartContainer for \"c7033fb59fff0d269309a24487427cbb52c09796e9cf5dbba3cbeeedacfc48e7\""
Feb  9 19:29:06.531000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.531000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.531000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.531000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.532000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.532000 audit: BPF prog-id=170 op=LOAD
Feb  9 19:29:06.533000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.533000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4637 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861316337363362613465663539366265613563653337343638646530
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4637 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861316337363362613465663539366265613563653337343638646530
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.534000 audit: BPF prog-id=171 op=LOAD
Feb  9 19:29:06.534000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d04c0 items=0 ppid=4637 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861316337363362613465663539366265613563653337343638646530
Feb  9 19:29:06.535000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.535000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.535000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.535000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.535000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.535000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.535000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.535000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.535000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.535000 audit: BPF prog-id=172 op=LOAD
Feb  9 19:29:06.535000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d0508 items=0 ppid=4637 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861316337363362613465663539366265613563653337343638646530
Feb  9 19:29:06.537000 audit: BPF prog-id=172 op=UNLOAD
Feb  9 19:29:06.537000 audit: BPF prog-id=171 op=UNLOAD
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { perfmon } for  pid=4645 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit[4645]: AVC avc:  denied  { bpf } for  pid=4645 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.537000 audit: BPF prog-id=173 op=LOAD
Feb  9 19:29:06.537000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d0918 items=0 ppid=4637 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861316337363362613465663539366265613563653337343638646530
Feb  9 19:29:06.589134 systemd[1]: Started cri-containerd-c7033fb59fff0d269309a24487427cbb52c09796e9cf5dbba3cbeeedacfc48e7.scope.
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.685000 audit: BPF prog-id=174 op=LOAD
Feb  9 19:29:06.686000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.686000 audit[4668]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4576 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303333666235396666663064323639333039613234343837343237
Feb  9 19:29:06.687000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.687000 audit[4668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4576 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303333666235396666663064323639333039613234343837343237
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.688000 audit: BPF prog-id=175 op=LOAD
Feb  9 19:29:06.688000 audit[4668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003da090 items=0 ppid=4576 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303333666235396666663064323639333039613234343837343237
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit: BPF prog-id=176 op=LOAD
Feb  9 19:29:06.689000 audit[4668]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003da0d8 items=0 ppid=4576 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303333666235396666663064323639333039613234343837343237
Feb  9 19:29:06.689000 audit: BPF prog-id=176 op=UNLOAD
Feb  9 19:29:06.689000 audit: BPF prog-id=175 op=UNLOAD
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { perfmon } for  pid=4668 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit[4668]: AVC avc:  denied  { bpf } for  pid=4668 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.689000 audit: BPF prog-id=177 op=LOAD
Feb  9 19:29:06.689000 audit[4668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003da4e8 items=0 ppid=4576 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303333666235396666663064323639333039613234343837343237
Feb  9 19:29:06.698605 env[1569]: time="2024-02-09T19:29:06.698473957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-vgl6s,Uid:64b71d7c-3082-4d3a-bf73-d4a8def05192,Namespace:kube-system,Attempt:1,} returns sandbox id \"8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a\""
Feb  9 19:29:06.705659 env[1569]: time="2024-02-09T19:29:06.705615101Z" level=info msg="CreateContainer within sandbox \"8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Feb  9 19:29:06.740793 env[1569]: time="2024-02-09T19:29:06.740707812Z" level=info msg="StartContainer for \"c7033fb59fff0d269309a24487427cbb52c09796e9cf5dbba3cbeeedacfc48e7\" returns successfully"
Feb  9 19:29:06.757543 env[1569]: time="2024-02-09T19:29:06.757489589Z" level=info msg="CreateContainer within sandbox \"8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"df40f472fc3090e1cb5e4a3e088dbc0816517eb469e57bb5aabff66114ac682f\""
Feb  9 19:29:06.758562 env[1569]: time="2024-02-09T19:29:06.758529521Z" level=info msg="StartContainer for \"df40f472fc3090e1cb5e4a3e088dbc0816517eb469e57bb5aabff66114ac682f\""
Feb  9 19:29:06.790283 systemd[1]: Started cri-containerd-df40f472fc3090e1cb5e4a3e088dbc0816517eb469e57bb5aabff66114ac682f.scope.
Feb  9 19:29:06.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.840000 audit: BPF prog-id=178 op=LOAD
Feb  9 19:29:06.841000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.841000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4637 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343066343732666333303930653163623565346133653038386462
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4637 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343066343732666333303930653163623565346133653038386462
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.842000 audit: BPF prog-id=179 op=LOAD
Feb  9 19:29:06.842000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000212fb0 items=0 ppid=4637 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343066343732666333303930653163623565346133653038386462
Feb  9 19:29:06.844000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.844000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.844000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.844000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.844000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.844000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.844000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.844000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.844000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.844000 audit: BPF prog-id=180 op=LOAD
Feb  9 19:29:06.844000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000212ff8 items=0 ppid=4637 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343066343732666333303930653163623565346133653038386462
Feb  9 19:29:06.846000 audit: BPF prog-id=180 op=UNLOAD
Feb  9 19:29:06.846000 audit: BPF prog-id=179 op=UNLOAD
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { perfmon } for  pid=4710 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit[4710]: AVC avc:  denied  { bpf } for  pid=4710 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:06.846000 audit: BPF prog-id=181 op=LOAD
Feb  9 19:29:06.846000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000213408 items=0 ppid=4637 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:06.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343066343732666333303930653163623565346133653038386462
Feb  9 19:29:06.890974 env[1569]: time="2024-02-09T19:29:06.890920759Z" level=info msg="StartContainer for \"df40f472fc3090e1cb5e4a3e088dbc0816517eb469e57bb5aabff66114ac682f\" returns successfully"
Feb  9 19:29:06.908509 env[1569]: time="2024-02-09T19:29:06.908460979Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:06.912358 env[1569]: time="2024-02-09T19:29:06.912318894Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:06.915877 env[1569]: time="2024-02-09T19:29:06.915807381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:06.919050 env[1569]: time="2024-02-09T19:29:06.919011141Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:06.919895 env[1569]: time="2024-02-09T19:29:06.919854863Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\""
Feb  9 19:29:06.922157 env[1569]: time="2024-02-09T19:29:06.922128661Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\""
Feb  9 19:29:06.924063 env[1569]: time="2024-02-09T19:29:06.924031023Z" level=info msg="CreateContainer within sandbox \"445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}"
Feb  9 19:29:06.953373 env[1569]: time="2024-02-09T19:29:06.953262543Z" level=info msg="CreateContainer within sandbox \"445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c4388bc96b3810a0e356537caad9ec509ef513a954a0dadf2fcf6d7a81a85e58\""
Feb  9 19:29:06.954462 env[1569]: time="2024-02-09T19:29:06.954428678Z" level=info msg="StartContainer for \"c4388bc96b3810a0e356537caad9ec509ef513a954a0dadf2fcf6d7a81a85e58\""
Feb  9 19:29:06.999184 systemd[1]: Started cri-containerd-c4388bc96b3810a0e356537caad9ec509ef513a954a0dadf2fcf6d7a81a85e58.scope.
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4335 pid=4749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:07.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334333838626339366233383130613065333536353337636161643965
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit: BPF prog-id=182 op=LOAD
Feb  9 19:29:07.062000 audit[4749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b49d0 items=0 ppid=4335 pid=4749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:07.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334333838626339366233383130613065333536353337636161643965
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit: BPF prog-id=183 op=LOAD
Feb  9 19:29:07.062000 audit[4749]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4a18 items=0 ppid=4335 pid=4749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:07.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334333838626339366233383130613065333536353337636161643965
Feb  9 19:29:07.062000 audit: BPF prog-id=183 op=UNLOAD
Feb  9 19:29:07.062000 audit: BPF prog-id=182 op=UNLOAD
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { perfmon } for  pid=4749 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit[4749]: AVC avc:  denied  { bpf } for  pid=4749 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:07.062000 audit: BPF prog-id=184 op=LOAD
Feb  9 19:29:07.062000 audit[4749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b4aa8 items=0 ppid=4335 pid=4749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:07.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334333838626339366233383130613065333536353337636161643965
Feb  9 19:29:07.102738 env[1569]: time="2024-02-09T19:29:07.102668122Z" level=info msg="StartContainer for \"c4388bc96b3810a0e356537caad9ec509ef513a954a0dadf2fcf6d7a81a85e58\" returns successfully"
Feb  9 19:29:07.190537 kubelet[2906]: I0209 19:29:07.190502    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-vgl6s" podStartSLOduration=44.190382033 pod.CreationTimestamp="2024-02-09 19:28:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:29:07.189954573 +0000 UTC m=+57.620951198" watchObservedRunningTime="2024-02-09 19:29:07.190382033 +0000 UTC m=+57.621378661"
Feb  9 19:29:07.207705 kubelet[2906]: I0209 19:29:07.207574    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-9bcsp" podStartSLOduration=44.20750771 pod.CreationTimestamp="2024-02-09 19:28:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:29:07.204632641 +0000 UTC m=+57.635629269" watchObservedRunningTime="2024-02-09 19:29:07.20750771 +0000 UTC m=+57.638504337"
Feb  9 19:29:07.374000 audit[4810]: NETFILTER_CFG table=filter:119 family=2 entries=12 op=nft_register_rule pid=4810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:29:07.374000 audit[4810]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc0a4185e0 a2=0 a3=7ffc0a4185cc items=0 ppid=3117 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:07.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:29:07.378846 systemd-networkd[1376]: cali829a776ec66: Gained IPv6LL
Feb  9 19:29:07.376000 audit[4810]: NETFILTER_CFG table=nat:120 family=2 entries=30 op=nft_register_rule pid=4810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:29:07.376000 audit[4810]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffc0a4185e0 a2=0 a3=7ffc0a4185cc items=0 ppid=3117 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:07.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:29:07.507958 systemd-networkd[1376]: califa9af4919e0: Gained IPv6LL
Feb  9 19:29:07.564000 audit[4836]: NETFILTER_CFG table=filter:121 family=2 entries=12 op=nft_register_rule pid=4836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:29:07.564000 audit[4836]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffcc9aefe80 a2=0 a3=7ffcc9aefe6c items=0 ppid=3117 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:07.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:29:07.565000 audit[4836]: NETFILTER_CFG table=nat:122 family=2 entries=30 op=nft_register_rule pid=4836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:29:07.565000 audit[4836]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffcc9aefe80 a2=0 a3=7ffcc9aefe6c items=0 ppid=3117 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:07.565000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:29:08.288000 audit[4862]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:29:08.288000 audit[4862]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcb0c96130 a2=0 a3=7ffcb0c9611c items=0 ppid=3117 pid=4862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:08.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:29:08.303936 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3595142579.mount: Deactivated successfully.
Feb  9 19:29:08.320000 audit[4862]: NETFILTER_CFG table=nat:124 family=2 entries=63 op=nft_register_chain pid=4862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:29:08.320000 audit[4862]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcb0c96130 a2=0 a3=7ffcb0c9611c items=0 ppid=3117 pid=4862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:08.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:29:09.362000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:09.364962 kernel: kauditd_printk_skb: 429 callbacks suppressed
Feb  9 19:29:09.365569 kernel: audit: type=1400 audit(1707506949.362:1368): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:09.362000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e9f300 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:29:09.392834 kernel: audit: type=1300 audit(1707506949.362:1368): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e9f300 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:29:09.464333 kernel: audit: type=1327 audit(1707506949.362:1368): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:29:09.464378 kernel: audit: type=1400 audit(1707506949.378:1369): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:09.464413 kernel: audit: type=1300 audit(1707506949.378:1369): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e9f380 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:29:09.466815 kernel: audit: type=1327 audit(1707506949.378:1369): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:29:09.466939 kernel: audit: type=1400 audit(1707506949.381:1370): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:09.467744 kernel: audit: type=1300 audit(1707506949.381:1370): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e9f800 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:29:09.468135 kernel: audit: type=1327 audit(1707506949.381:1370): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:29:09.468186 kernel: audit: type=1400 audit(1707506949.444:1371): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:09.362000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:29:09.378000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:09.378000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e9f380 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:29:09.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:29:09.381000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:09.381000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e9f800 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:29:09.381000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:29:09.444000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:29:09.444000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e9f880 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:29:09.444000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:29:09.520000 audit[4890]: NETFILTER_CFG table=filter:125 family=2 entries=6 op=nft_register_rule pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:29:09.520000 audit[4890]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffca6cd76e0 a2=0 a3=7ffca6cd76cc items=0 ppid=3117 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:09.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:29:09.535000 audit[4890]: NETFILTER_CFG table=nat:126 family=2 entries=78 op=nft_register_rule pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:29:09.535000 audit[4890]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffca6cd76e0 a2=0 a3=7ffca6cd76cc items=0 ppid=3117 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:09.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:29:09.818730 env[1569]: time="2024-02-09T19:29:09.818662433Z" level=info msg="StopPodSandbox for \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\""
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.888 [WARNING][4906] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"64b71d7c-3082-4d3a-bf73-d4a8def05192", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a", Pod:"coredns-787d4945fb-vgl6s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali829a776ec66", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.889 [INFO][4906] k8s.go 578: Cleaning up netns ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.889 [INFO][4906] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" iface="eth0" netns=""
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.889 [INFO][4906] k8s.go 585: Releasing IP address(es) ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.889 [INFO][4906] utils.go 188: Calico CNI releasing IP address ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.949 [INFO][4912] ipam_plugin.go 415: Releasing address using handleID ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" HandleID="k8s-pod-network.9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.949 [INFO][4912] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.949 [INFO][4912] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.960 [WARNING][4912] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" HandleID="k8s-pod-network.9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.960 [INFO][4912] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" HandleID="k8s-pod-network.9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.965 [INFO][4912] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:09.972362 env[1569]: 2024-02-09 19:29:09.969 [INFO][4906] k8s.go 591: Teardown processing complete. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:09.973493 env[1569]: time="2024-02-09T19:29:09.973339413Z" level=info msg="TearDown network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\" successfully"
Feb  9 19:29:09.973646 env[1569]: time="2024-02-09T19:29:09.973490102Z" level=info msg="StopPodSandbox for \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\" returns successfully"
Feb  9 19:29:09.974708 env[1569]: time="2024-02-09T19:29:09.974614047Z" level=info msg="RemovePodSandbox for \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\""
Feb  9 19:29:09.974953 env[1569]: time="2024-02-09T19:29:09.974896419Z" level=info msg="Forcibly stopping sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\""
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.060 [WARNING][4930] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"64b71d7c-3082-4d3a-bf73-d4a8def05192", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"8a1c763ba4ef596bea5ce37468de0b6643e50fb0b23327abc139159e8011eb2a", Pod:"coredns-787d4945fb-vgl6s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali829a776ec66", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.061 [INFO][4930] k8s.go 578: Cleaning up netns ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.061 [INFO][4930] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" iface="eth0" netns=""
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.061 [INFO][4930] k8s.go 585: Releasing IP address(es) ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.061 [INFO][4930] utils.go 188: Calico CNI releasing IP address ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.103 [INFO][4936] ipam_plugin.go 415: Releasing address using handleID ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" HandleID="k8s-pod-network.9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.103 [INFO][4936] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.103 [INFO][4936] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.111 [WARNING][4936] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" HandleID="k8s-pod-network.9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.111 [INFO][4936] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" HandleID="k8s-pod-network.9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--vgl6s-eth0"
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.122 [INFO][4936] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:10.138648 env[1569]: 2024-02-09 19:29:10.133 [INFO][4930] k8s.go 591: Teardown processing complete. ContainerID="9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538"
Feb  9 19:29:10.138648 env[1569]: time="2024-02-09T19:29:10.136961809Z" level=info msg="TearDown network for sandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\" successfully"
Feb  9 19:29:10.142750 env[1569]: time="2024-02-09T19:29:10.142673675Z" level=info msg="RemovePodSandbox \"9270ed7f0d81da9863646e99cc430e38dcc5c1b76ed10d68d7d4306be4539538\" returns successfully"
Feb  9 19:29:10.143543 env[1569]: time="2024-02-09T19:29:10.143505313Z" level=info msg="StopPodSandbox for \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\""
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.253 [WARNING][4955] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0", GenerateName:"calico-kube-controllers-565445cd7d-", Namespace:"calico-system", SelfLink:"", UID:"1de46490-a895-43fe-99d1-c548bdb7a466", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565445cd7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c", Pod:"calico-kube-controllers-565445cd7d-48kd5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.121.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali68ed0b3c13c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.253 [INFO][4955] k8s.go 578: Cleaning up netns ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.254 [INFO][4955] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" iface="eth0" netns=""
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.254 [INFO][4955] k8s.go 585: Releasing IP address(es) ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.254 [INFO][4955] utils.go 188: Calico CNI releasing IP address ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.297 [INFO][4961] ipam_plugin.go 415: Releasing address using handleID ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" HandleID="k8s-pod-network.4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.298 [INFO][4961] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.298 [INFO][4961] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.309 [WARNING][4961] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" HandleID="k8s-pod-network.4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.309 [INFO][4961] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" HandleID="k8s-pod-network.4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.312 [INFO][4961] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:10.317989 env[1569]: 2024-02-09 19:29:10.316 [INFO][4955] k8s.go 591: Teardown processing complete. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:10.318645 env[1569]: time="2024-02-09T19:29:10.318027807Z" level=info msg="TearDown network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\" successfully"
Feb  9 19:29:10.318645 env[1569]: time="2024-02-09T19:29:10.318062966Z" level=info msg="StopPodSandbox for \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\" returns successfully"
Feb  9 19:29:10.319412 env[1569]: time="2024-02-09T19:29:10.319368031Z" level=info msg="RemovePodSandbox for \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\""
Feb  9 19:29:10.320931 env[1569]: time="2024-02-09T19:29:10.320840894Z" level=info msg="Forcibly stopping sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\""
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.405 [WARNING][4980] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0", GenerateName:"calico-kube-controllers-565445cd7d-", Namespace:"calico-system", SelfLink:"", UID:"1de46490-a895-43fe-99d1-c548bdb7a466", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565445cd7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c", Pod:"calico-kube-controllers-565445cd7d-48kd5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.121.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali68ed0b3c13c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.405 [INFO][4980] k8s.go 578: Cleaning up netns ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.406 [INFO][4980] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" iface="eth0" netns=""
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.406 [INFO][4980] k8s.go 585: Releasing IP address(es) ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.406 [INFO][4980] utils.go 188: Calico CNI releasing IP address ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.446 [INFO][4986] ipam_plugin.go 415: Releasing address using handleID ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" HandleID="k8s-pod-network.4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.446 [INFO][4986] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.446 [INFO][4986] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.468 [WARNING][4986] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" HandleID="k8s-pod-network.4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.468 [INFO][4986] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" HandleID="k8s-pod-network.4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6" Workload="ip--172--31--21--113-k8s-calico--kube--controllers--565445cd7d--48kd5-eth0"
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.473 [INFO][4986] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:10.476879 env[1569]: 2024-02-09 19:29:10.475 [INFO][4980] k8s.go 591: Teardown processing complete. ContainerID="4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6"
Feb  9 19:29:10.477902 env[1569]: time="2024-02-09T19:29:10.477000857Z" level=info msg="TearDown network for sandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\" successfully"
Feb  9 19:29:10.482522 env[1569]: time="2024-02-09T19:29:10.482481065Z" level=info msg="RemovePodSandbox \"4c20a1d5f70b837524399abe338ee2682dcae9635f7ef328ac9c5bb637a552f6\" returns successfully"
Feb  9 19:29:10.483313 env[1569]: time="2024-02-09T19:29:10.483276719Z" level=info msg="StopPodSandbox for \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\""
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.545 [WARNING][5006] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"30fb5769-46fd-45b8-8cbe-f223e147e943", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c", Pod:"coredns-787d4945fb-9bcsp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califa9af4919e0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.546 [INFO][5006] k8s.go 578: Cleaning up netns ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.546 [INFO][5006] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" iface="eth0" netns=""
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.546 [INFO][5006] k8s.go 585: Releasing IP address(es) ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.546 [INFO][5006] utils.go 188: Calico CNI releasing IP address ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.608 [INFO][5012] ipam_plugin.go 415: Releasing address using handleID ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" HandleID="k8s-pod-network.377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.609 [INFO][5012] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.609 [INFO][5012] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.635 [WARNING][5012] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" HandleID="k8s-pod-network.377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.635 [INFO][5012] ipam_plugin.go 443: Releasing address using workloadID ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" HandleID="k8s-pod-network.377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.638 [INFO][5012] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:10.646197 env[1569]: 2024-02-09 19:29:10.643 [INFO][5006] k8s.go 591: Teardown processing complete. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:10.646197 env[1569]: time="2024-02-09T19:29:10.646036805Z" level=info msg="TearDown network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\" successfully"
Feb  9 19:29:10.646197 env[1569]: time="2024-02-09T19:29:10.646063467Z" level=info msg="StopPodSandbox for \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\" returns successfully"
Feb  9 19:29:10.647953 env[1569]: time="2024-02-09T19:29:10.647929353Z" level=info msg="RemovePodSandbox for \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\""
Feb  9 19:29:10.648143 env[1569]: time="2024-02-09T19:29:10.648079170Z" level=info msg="Forcibly stopping sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\""
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.712 [WARNING][5031] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"30fb5769-46fd-45b8-8cbe-f223e147e943", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"349ba91b6ea7308bc878c8531768d5da5cb8e2630971855309a469a81ddf0b5c", Pod:"coredns-787d4945fb-9bcsp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califa9af4919e0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.713 [INFO][5031] k8s.go 578: Cleaning up netns ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.713 [INFO][5031] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" iface="eth0" netns=""
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.713 [INFO][5031] k8s.go 585: Releasing IP address(es) ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.713 [INFO][5031] utils.go 188: Calico CNI releasing IP address ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.763 [INFO][5037] ipam_plugin.go 415: Releasing address using handleID ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" HandleID="k8s-pod-network.377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.765 [INFO][5037] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.765 [INFO][5037] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.786 [WARNING][5037] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" HandleID="k8s-pod-network.377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.786 [INFO][5037] ipam_plugin.go 443: Releasing address using workloadID ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" HandleID="k8s-pod-network.377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b" Workload="ip--172--31--21--113-k8s-coredns--787d4945fb--9bcsp-eth0"
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.790 [INFO][5037] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:10.799626 env[1569]: 2024-02-09 19:29:10.795 [INFO][5031] k8s.go 591: Teardown processing complete. ContainerID="377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b"
Feb  9 19:29:10.802860 env[1569]: time="2024-02-09T19:29:10.799580374Z" level=info msg="TearDown network for sandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\" successfully"
Feb  9 19:29:10.815465 env[1569]: time="2024-02-09T19:29:10.815411454Z" level=info msg="RemovePodSandbox \"377858b5a2269701d3684c50d5fca1e6a4a6087de1a76acdc8c968dfc29b8a7b\" returns successfully"
Feb  9 19:29:10.816518 env[1569]: time="2024-02-09T19:29:10.816333582Z" level=info msg="StopPodSandbox for \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\""
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.905 [WARNING][5058] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1", ResourceVersion:"688", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134", Pod:"csi-node-driver-swjtr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali54b429bfc0a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.906 [INFO][5058] k8s.go 578: Cleaning up netns ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.906 [INFO][5058] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" iface="eth0" netns=""
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.906 [INFO][5058] k8s.go 585: Releasing IP address(es) ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.906 [INFO][5058] utils.go 188: Calico CNI releasing IP address ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.950 [INFO][5064] ipam_plugin.go 415: Releasing address using handleID ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" HandleID="k8s-pod-network.857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.950 [INFO][5064] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.950 [INFO][5064] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.963 [WARNING][5064] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" HandleID="k8s-pod-network.857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.963 [INFO][5064] ipam_plugin.go 443: Releasing address using workloadID ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" HandleID="k8s-pod-network.857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.972 [INFO][5064] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:10.985262 env[1569]: 2024-02-09 19:29:10.981 [INFO][5058] k8s.go 591: Teardown processing complete. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:10.986996 env[1569]: time="2024-02-09T19:29:10.985302294Z" level=info msg="TearDown network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\" successfully"
Feb  9 19:29:10.986996 env[1569]: time="2024-02-09T19:29:10.985340246Z" level=info msg="StopPodSandbox for \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\" returns successfully"
Feb  9 19:29:10.986996 env[1569]: time="2024-02-09T19:29:10.986277329Z" level=info msg="RemovePodSandbox for \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\""
Feb  9 19:29:10.986996 env[1569]: time="2024-02-09T19:29:10.986315510Z" level=info msg="Forcibly stopping sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\""
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.132 [WARNING][5085] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cc993e12-34a4-4fca-b5b6-b11e7c9e0ea1", ResourceVersion:"688", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134", Pod:"csi-node-driver-swjtr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali54b429bfc0a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.133 [INFO][5085] k8s.go 578: Cleaning up netns ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.133 [INFO][5085] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" iface="eth0" netns=""
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.133 [INFO][5085] k8s.go 585: Releasing IP address(es) ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.133 [INFO][5085] utils.go 188: Calico CNI releasing IP address ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.201 [INFO][5096] ipam_plugin.go 415: Releasing address using handleID ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" HandleID="k8s-pod-network.857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.202 [INFO][5096] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.207 [INFO][5096] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.227 [WARNING][5096] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" HandleID="k8s-pod-network.857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.227 [INFO][5096] ipam_plugin.go 443: Releasing address using workloadID ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" HandleID="k8s-pod-network.857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151" Workload="ip--172--31--21--113-k8s-csi--node--driver--swjtr-eth0"
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.230 [INFO][5096] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:29:11.235057 env[1569]: 2024-02-09 19:29:11.232 [INFO][5085] k8s.go 591: Teardown processing complete. ContainerID="857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151"
Feb  9 19:29:11.246995 env[1569]: time="2024-02-09T19:29:11.235491664Z" level=info msg="TearDown network for sandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\" successfully"
Feb  9 19:29:11.253295 env[1569]: time="2024-02-09T19:29:11.253248480Z" level=info msg="RemovePodSandbox \"857cac5811963948dbd107f963107789608e8a8e7a0bc97674e472a53268e151\" returns successfully"
Feb  9 19:29:12.276164 env[1569]: time="2024-02-09T19:29:12.276117178Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:12.292566 env[1569]: time="2024-02-09T19:29:12.292513256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:12.294394 env[1569]: time="2024-02-09T19:29:12.294349487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:12.297574 env[1569]: time="2024-02-09T19:29:12.297525420Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:12.299649 env[1569]: time="2024-02-09T19:29:12.298995882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\""
Feb  9 19:29:12.305216 env[1569]: time="2024-02-09T19:29:12.305182879Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\""
Feb  9 19:29:12.336727 env[1569]: time="2024-02-09T19:29:12.336661507Z" level=info msg="CreateContainer within sandbox \"8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}"
Feb  9 19:29:12.361959 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1937315488.mount: Deactivated successfully.
Feb  9 19:29:12.370229 env[1569]: time="2024-02-09T19:29:12.370184059Z" level=info msg="CreateContainer within sandbox \"8bde3f36a63beb175a8a001d8b82a0df73ed9ad966f07ad0720074c0fdf0021c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"cd35bce6c6b91eb8b65979efac4163371c7be9f6d3d67f85ab5285ff63d31f3a\""
Feb  9 19:29:12.373461 env[1569]: time="2024-02-09T19:29:12.371300484Z" level=info msg="StartContainer for \"cd35bce6c6b91eb8b65979efac4163371c7be9f6d3d67f85ab5285ff63d31f3a\""
Feb  9 19:29:12.416544 systemd[1]: Started cri-containerd-cd35bce6c6b91eb8b65979efac4163371c7be9f6d3d67f85ab5285ff63d31f3a.scope.
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.502000 audit: BPF prog-id=185 op=LOAD
Feb  9 19:29:12.507000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.507000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4432 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:12.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333562636536633662393165623862363539373965666163343136
Feb  9 19:29:12.508000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.508000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=4432 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:12.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333562636536633662393165623862363539373965666163343136
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.509000 audit: BPF prog-id=186 op=LOAD
Feb  9 19:29:12.509000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000313270 items=0 ppid=4432 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:12.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333562636536633662393165623862363539373965666163343136
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit: BPF prog-id=187 op=LOAD
Feb  9 19:29:12.510000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003132b8 items=0 ppid=4432 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:12.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333562636536633662393165623862363539373965666163343136
Feb  9 19:29:12.510000 audit: BPF prog-id=187 op=UNLOAD
Feb  9 19:29:12.510000 audit: BPF prog-id=186 op=UNLOAD
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { perfmon } for  pid=5116 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit[5116]: AVC avc:  denied  { bpf } for  pid=5116 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:12.510000 audit: BPF prog-id=188 op=LOAD
Feb  9 19:29:12.510000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003136c8 items=0 ppid=4432 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:12.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333562636536633662393165623862363539373965666163343136
Feb  9 19:29:12.572631 env[1569]: time="2024-02-09T19:29:12.572436933Z" level=info msg="StartContainer for \"cd35bce6c6b91eb8b65979efac4163371c7be9f6d3d67f85ab5285ff63d31f3a\" returns successfully"
Feb  9 19:29:13.316537 kubelet[2906]: I0209 19:29:13.315987    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-565445cd7d-48kd5" podStartSLOduration=-9.223371993538847e+09 pod.CreationTimestamp="2024-02-09 19:28:30 +0000 UTC" firstStartedPulling="2024-02-09 19:29:04.568389722 +0000 UTC m=+54.999386327" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:29:13.236025669 +0000 UTC m=+63.667022299" watchObservedRunningTime="2024-02-09 19:29:13.315929174 +0000 UTC m=+63.746925802"
Feb  9 19:29:14.186905 env[1569]: time="2024-02-09T19:29:14.186813464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:14.192151 env[1569]: time="2024-02-09T19:29:14.192104825Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:14.195673 env[1569]: time="2024-02-09T19:29:14.195634472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:14.198379 env[1569]: time="2024-02-09T19:29:14.198339024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:29:14.198998 env[1569]: time="2024-02-09T19:29:14.198925435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\""
Feb  9 19:29:14.212852 env[1569]: time="2024-02-09T19:29:14.212810448Z" level=info msg="CreateContainer within sandbox \"445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}"
Feb  9 19:29:14.241585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount940722325.mount: Deactivated successfully.
Feb  9 19:29:14.248947 env[1569]: time="2024-02-09T19:29:14.248902028Z" level=info msg="CreateContainer within sandbox \"445506089c85dd840d8c428553cbf7f78232fbafe2b7b8b080d5aae1227ba134\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4df88c46ef1a48b3ba1af95c5588da2d2e4ac4749bb26fb80ec95eb767d2a255\""
Feb  9 19:29:14.255733 env[1569]: time="2024-02-09T19:29:14.254911938Z" level=info msg="StartContainer for \"4df88c46ef1a48b3ba1af95c5588da2d2e4ac4749bb26fb80ec95eb767d2a255\""
Feb  9 19:29:14.301858 systemd[1]: Started cri-containerd-4df88c46ef1a48b3ba1af95c5588da2d2e4ac4749bb26fb80ec95eb767d2a255.scope.
Feb  9 19:29:14.327364 systemd[1]: run-containerd-runc-k8s.io-4df88c46ef1a48b3ba1af95c5588da2d2e4ac4749bb26fb80ec95eb767d2a255-runc.gbZDMX.mount: Deactivated successfully.
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4335 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:14.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464663838633436656631613438623362613161663935633535383864
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit: BPF prog-id=189 op=LOAD
Feb  9 19:29:14.338000 audit[5169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003053a0 items=0 ppid=4335 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:14.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464663838633436656631613438623362613161663935633535383864
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit: BPF prog-id=190 op=LOAD
Feb  9 19:29:14.338000 audit[5169]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003053e8 items=0 ppid=4335 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:14.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464663838633436656631613438623362613161663935633535383864
Feb  9 19:29:14.338000 audit: BPF prog-id=190 op=UNLOAD
Feb  9 19:29:14.338000 audit: BPF prog-id=189 op=UNLOAD
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { perfmon } for  pid=5169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit[5169]: AVC avc:  denied  { bpf } for  pid=5169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:29:14.338000 audit: BPF prog-id=191 op=LOAD
Feb  9 19:29:14.338000 audit[5169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000305478 items=0 ppid=4335 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:14.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464663838633436656631613438623362613161663935633535383864
Feb  9 19:29:14.475549 env[1569]: time="2024-02-09T19:29:14.475420530Z" level=info msg="StartContainer for \"4df88c46ef1a48b3ba1af95c5588da2d2e4ac4749bb26fb80ec95eb767d2a255\" returns successfully"
Feb  9 19:29:14.971457 kubelet[2906]: I0209 19:29:14.971344    2906 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0
Feb  9 19:29:14.972177 kubelet[2906]: I0209 19:29:14.972151    2906 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock
Feb  9 19:29:15.229030 kubelet[2906]: I0209 19:29:15.228919    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-swjtr" podStartSLOduration=-9.223371991625921e+09 pod.CreationTimestamp="2024-02-09 19:28:30 +0000 UTC" firstStartedPulling="2024-02-09 19:29:03.986061678 +0000 UTC m=+54.417058291" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:29:15.227498946 +0000 UTC m=+65.658495575" watchObservedRunningTime="2024-02-09 19:29:15.228854713 +0000 UTC m=+65.659851340"
Feb  9 19:29:17.858660 systemd[1]: run-containerd-runc-k8s.io-ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1-runc.gxAAHD.mount: Deactivated successfully.
Feb  9 19:29:18.852506 systemd[1]: run-containerd-runc-k8s.io-cd35bce6c6b91eb8b65979efac4163371c7be9f6d3d67f85ab5285ff63d31f3a-runc.DsN24b.mount: Deactivated successfully.
Feb  9 19:29:19.205807 kernel: kauditd_printk_skb: 108 callbacks suppressed
Feb  9 19:29:19.205963 kernel: audit: type=1130 audit(1707506959.200:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.113:22-139.178.68.195:50546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:19.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.113:22-139.178.68.195:50546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:19.200600 systemd[1]: Started sshd@7-172.31.21.113:22-139.178.68.195:50546.service.
Feb  9 19:29:19.440000 audit[5251]: USER_ACCT pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:19.442449 sshd[5251]: Accepted publickey for core from 139.178.68.195 port 50546 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:29:19.447000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:19.454001 kernel: audit: type=1101 audit(1707506959.440:1399): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:19.454126 kernel: audit: type=1103 audit(1707506959.447:1400): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:19.454545 sshd[5251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:29:19.457604 kernel: audit: type=1006 audit(1707506959.447:1401): pid=5251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1
Feb  9 19:29:19.447000 audit[5251]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc41c76680 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:19.447000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:19.467115 kernel: audit: type=1300 audit(1707506959.447:1401): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc41c76680 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:19.467177 kernel: audit: type=1327 audit(1707506959.447:1401): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:19.469642 systemd[1]: Started session-8.scope.
Feb  9 19:29:19.470099 systemd-logind[1552]: New session 8 of user core.
Feb  9 19:29:19.478000 audit[5251]: USER_START pid=5251 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:19.486000 audit[5253]: CRED_ACQ pid=5253 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:19.492866 kernel: audit: type=1105 audit(1707506959.478:1402): pid=5251 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:19.492964 kernel: audit: type=1103 audit(1707506959.486:1403): pid=5253 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:20.177613 sshd[5251]: pam_unix(sshd:session): session closed for user core
Feb  9 19:29:20.179000 audit[5251]: USER_END pid=5251 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:20.181000 audit[5251]: CRED_DISP pid=5251 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:20.195948 kernel: audit: type=1106 audit(1707506960.179:1404): pid=5251 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:20.196147 kernel: audit: type=1104 audit(1707506960.181:1405): pid=5251 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:20.194113 systemd[1]: sshd@7-172.31.21.113:22-139.178.68.195:50546.service: Deactivated successfully.
Feb  9 19:29:20.195305 systemd[1]: session-8.scope: Deactivated successfully.
Feb  9 19:29:20.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.113:22-139.178.68.195:50546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:20.196933 systemd-logind[1552]: Session 8 logged out. Waiting for processes to exit.
Feb  9 19:29:20.198248 systemd-logind[1552]: Removed session 8.
Feb  9 19:29:25.203817 systemd[1]: Started sshd@8-172.31.21.113:22-139.178.68.195:50556.service.
Feb  9 19:29:25.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.113:22-139.178.68.195:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:25.205147 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:29:25.205229 kernel: audit: type=1130 audit(1707506965.202:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.113:22-139.178.68.195:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:25.381000 audit[5273]: USER_ACCT pid=5273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.383565 sshd[5273]: Accepted publickey for core from 139.178.68.195 port 50556 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:29:25.395263 kernel: audit: type=1101 audit(1707506965.381:1408): pid=5273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.395947 kernel: audit: type=1103 audit(1707506965.387:1409): pid=5273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.396013 kernel: audit: type=1006 audit(1707506965.387:1410): pid=5273 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1
Feb  9 19:29:25.387000 audit[5273]: CRED_ACQ pid=5273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.390413 sshd[5273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:29:25.387000 audit[5273]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc751e17b0 a2=3 a3=0 items=0 ppid=1 pid=5273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:25.403946 systemd[1]: Started session-9.scope.
Feb  9 19:29:25.406032 kernel: audit: type=1300 audit(1707506965.387:1410): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc751e17b0 a2=3 a3=0 items=0 ppid=1 pid=5273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:25.406123 kernel: audit: type=1327 audit(1707506965.387:1410): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:25.387000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:25.405536 systemd-logind[1552]: New session 9 of user core.
Feb  9 19:29:25.412000 audit[5273]: USER_START pid=5273 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.414000 audit[5275]: CRED_ACQ pid=5275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.426320 kernel: audit: type=1105 audit(1707506965.412:1411): pid=5273 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.426424 kernel: audit: type=1103 audit(1707506965.414:1412): pid=5275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.609104 sshd[5273]: pam_unix(sshd:session): session closed for user core
Feb  9 19:29:25.609000 audit[5273]: USER_END pid=5273 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.618719 kernel: audit: type=1106 audit(1707506965.609:1413): pid=5273 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.617000 audit[5273]: CRED_DISP pid=5273 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.621539 systemd[1]: sshd@8-172.31.21.113:22-139.178.68.195:50556.service: Deactivated successfully.
Feb  9 19:29:25.623527 systemd[1]: session-9.scope: Deactivated successfully.
Feb  9 19:29:25.626757 kernel: audit: type=1104 audit(1707506965.617:1414): pid=5273 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:25.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.113:22-139.178.68.195:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:25.628520 systemd-logind[1552]: Session 9 logged out. Waiting for processes to exit.
Feb  9 19:29:25.631744 systemd-logind[1552]: Removed session 9.
Feb  9 19:29:30.639711 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:29:30.640037 kernel: audit: type=1130 audit(1707506970.636:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.113:22-139.178.68.195:34594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:30.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.113:22-139.178.68.195:34594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:30.637459 systemd[1]: Started sshd@9-172.31.21.113:22-139.178.68.195:34594.service.
Feb  9 19:29:30.805000 audit[5289]: USER_ACCT pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:30.814621 sshd[5289]: Accepted publickey for core from 139.178.68.195 port 34594 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:29:30.815030 kernel: audit: type=1101 audit(1707506970.805:1417): pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:30.813000 audit[5289]: CRED_ACQ pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:30.816243 sshd[5289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:29:30.822789 kernel: audit: type=1103 audit(1707506970.813:1418): pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:30.827775 kernel: audit: type=1006 audit(1707506970.813:1419): pid=5289 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1
Feb  9 19:29:30.813000 audit[5289]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0de6ff70 a2=3 a3=0 items=0 ppid=1 pid=5289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:30.813000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:30.837608 systemd[1]: Started session-10.scope.
Feb  9 19:29:30.838931 systemd-logind[1552]: New session 10 of user core.
Feb  9 19:29:30.840396 kernel: audit: type=1300 audit(1707506970.813:1419): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0de6ff70 a2=3 a3=0 items=0 ppid=1 pid=5289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:30.840586 kernel: audit: type=1327 audit(1707506970.813:1419): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:30.847000 audit[5289]: USER_START pid=5289 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:30.862722 kernel: audit: type=1105 audit(1707506970.847:1420): pid=5289 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:30.862867 kernel: audit: type=1103 audit(1707506970.852:1421): pid=5292 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:30.852000 audit[5292]: CRED_ACQ pid=5292 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:31.071406 sshd[5289]: pam_unix(sshd:session): session closed for user core
Feb  9 19:29:31.071000 audit[5289]: USER_END pid=5289 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:31.075936 systemd[1]: sshd@9-172.31.21.113:22-139.178.68.195:34594.service: Deactivated successfully.
Feb  9 19:29:31.076917 systemd[1]: session-10.scope: Deactivated successfully.
Feb  9 19:29:31.080813 kernel: audit: type=1106 audit(1707506971.071:1422): pid=5289 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:31.071000 audit[5289]: CRED_DISP pid=5289 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:31.081203 systemd-logind[1552]: Session 10 logged out. Waiting for processes to exit.
Feb  9 19:29:31.084376 systemd-logind[1552]: Removed session 10.
Feb  9 19:29:31.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.113:22-139.178.68.195:34594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:31.086815 kernel: audit: type=1104 audit(1707506971.071:1423): pid=5289 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.101796 systemd[1]: Started sshd@10-172.31.21.113:22-139.178.68.195:42282.service.
Feb  9 19:29:36.105415 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:29:36.105664 kernel: audit: type=1130 audit(1707506976.100:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.113:22-139.178.68.195:42282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:36.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.113:22-139.178.68.195:42282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:36.279000 audit[5304]: USER_ACCT pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.282051 sshd[5304]: Accepted publickey for core from 139.178.68.195 port 42282 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:29:36.288710 kernel: audit: type=1101 audit(1707506976.279:1426): pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.288844 kernel: audit: type=1103 audit(1707506976.287:1427): pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.287000 audit[5304]: CRED_ACQ pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.289727 sshd[5304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:29:36.298875 kernel: audit: type=1006 audit(1707506976.287:1428): pid=5304 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1
Feb  9 19:29:36.298988 kernel: audit: type=1300 audit(1707506976.287:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed366f7a0 a2=3 a3=0 items=0 ppid=1 pid=5304 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:36.287000 audit[5304]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed366f7a0 a2=3 a3=0 items=0 ppid=1 pid=5304 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:36.305228 systemd[1]: Started session-11.scope.
Feb  9 19:29:36.308365 kernel: audit: type=1327 audit(1707506976.287:1428): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:36.287000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:36.307828 systemd-logind[1552]: New session 11 of user core.
Feb  9 19:29:36.314000 audit[5304]: USER_START pid=5304 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.327121 kernel: audit: type=1105 audit(1707506976.314:1429): pid=5304 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.327330 kernel: audit: type=1103 audit(1707506976.323:1430): pid=5306 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.323000 audit[5306]: CRED_ACQ pid=5306 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.548128 sshd[5304]: pam_unix(sshd:session): session closed for user core
Feb  9 19:29:36.548000 audit[5304]: USER_END pid=5304 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.561651 systemd[1]: sshd@10-172.31.21.113:22-139.178.68.195:42282.service: Deactivated successfully.
Feb  9 19:29:36.561934 kernel: audit: type=1106 audit(1707506976.548:1431): pid=5304 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.548000 audit[5304]: CRED_DISP pid=5304 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.563525 systemd[1]: session-11.scope: Deactivated successfully.
Feb  9 19:29:36.563587 systemd-logind[1552]: Session 11 logged out. Waiting for processes to exit.
Feb  9 19:29:36.574782 kernel: audit: type=1104 audit(1707506976.548:1432): pid=5304 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:36.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.113:22-139.178.68.195:42282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:36.576616 systemd-logind[1552]: Removed session 11.
Feb  9 19:29:40.655533 systemd[1]: run-containerd-runc-k8s.io-cd35bce6c6b91eb8b65979efac4163371c7be9f6d3d67f85ab5285ff63d31f3a-runc.QkZQ5Q.mount: Deactivated successfully.
Feb  9 19:29:41.580623 systemd[1]: Started sshd@11-172.31.21.113:22-139.178.68.195:42284.service.
Feb  9 19:29:41.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.113:22-139.178.68.195:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:41.585121 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:29:41.585242 kernel: audit: type=1130 audit(1707506981.579:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.113:22-139.178.68.195:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:41.790000 audit[5341]: USER_ACCT pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:41.797871 sshd[5341]: Accepted publickey for core from 139.178.68.195 port 42284 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:29:41.798780 kernel: audit: type=1101 audit(1707506981.790:1435): pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:41.797000 audit[5341]: CRED_ACQ pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:41.800603 sshd[5341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:29:41.808928 kernel: audit: type=1103 audit(1707506981.797:1436): pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:41.809071 kernel: audit: type=1006 audit(1707506981.798:1437): pid=5341 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1
Feb  9 19:29:41.809112 kernel: audit: type=1300 audit(1707506981.798:1437): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd78085d60 a2=3 a3=0 items=0 ppid=1 pid=5341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:41.798000 audit[5341]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd78085d60 a2=3 a3=0 items=0 ppid=1 pid=5341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:41.821990 kernel: audit: type=1327 audit(1707506981.798:1437): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:41.798000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:41.823780 systemd[1]: Started session-12.scope.
Feb  9 19:29:41.825130 systemd-logind[1552]: New session 12 of user core.
Feb  9 19:29:41.830000 audit[5341]: USER_START pid=5341 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:41.833000 audit[5343]: CRED_ACQ pid=5343 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:41.851581 kernel: audit: type=1105 audit(1707506981.830:1438): pid=5341 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:41.851741 kernel: audit: type=1103 audit(1707506981.833:1439): pid=5343 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:42.068468 sshd[5341]: pam_unix(sshd:session): session closed for user core
Feb  9 19:29:42.071000 audit[5341]: USER_END pid=5341 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:42.083791 kernel: audit: type=1106 audit(1707506982.071:1440): pid=5341 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:42.072000 audit[5341]: CRED_DISP pid=5341 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:42.085283 systemd[1]: sshd@11-172.31.21.113:22-139.178.68.195:42284.service: Deactivated successfully.
Feb  9 19:29:42.086813 systemd[1]: session-12.scope: Deactivated successfully.
Feb  9 19:29:42.089458 systemd-logind[1552]: Session 12 logged out. Waiting for processes to exit.
Feb  9 19:29:42.093251 kernel: audit: type=1104 audit(1707506982.072:1441): pid=5341 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:42.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.113:22-139.178.68.195:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:42.098156 systemd-logind[1552]: Removed session 12.
Feb  9 19:29:42.101295 systemd[1]: Started sshd@12-172.31.21.113:22-139.178.68.195:42292.service.
Feb  9 19:29:42.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.113:22-139.178.68.195:42292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:42.296000 audit[5355]: USER_ACCT pid=5355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:42.299645 sshd[5355]: Accepted publickey for core from 139.178.68.195 port 42292 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:29:42.298000 audit[5355]: CRED_ACQ pid=5355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:42.298000 audit[5355]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc463fcc40 a2=3 a3=0 items=0 ppid=1 pid=5355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:42.298000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:42.300504 sshd[5355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:29:42.310258 systemd[1]: Started session-13.scope.
Feb  9 19:29:42.310961 systemd-logind[1552]: New session 13 of user core.
Feb  9 19:29:42.318000 audit[5355]: USER_START pid=5355 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:42.321000 audit[5357]: CRED_ACQ pid=5357 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:44.412031 sshd[5355]: pam_unix(sshd:session): session closed for user core
Feb  9 19:29:44.419000 audit[5355]: USER_END pid=5355 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:44.420000 audit[5355]: CRED_DISP pid=5355 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:44.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.113:22-139.178.68.195:42296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:44.440167 systemd[1]: Started sshd@13-172.31.21.113:22-139.178.68.195:42296.service.
Feb  9 19:29:44.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.113:22-139.178.68.195:42292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:44.442409 systemd[1]: sshd@12-172.31.21.113:22-139.178.68.195:42292.service: Deactivated successfully.
Feb  9 19:29:44.448415 systemd[1]: session-13.scope: Deactivated successfully.
Feb  9 19:29:44.452337 systemd-logind[1552]: Session 13 logged out. Waiting for processes to exit.
Feb  9 19:29:44.456664 systemd-logind[1552]: Removed session 13.
Feb  9 19:29:44.674000 audit[5366]: USER_ACCT pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:44.677670 sshd[5366]: Accepted publickey for core from 139.178.68.195 port 42296 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:29:44.676000 audit[5366]: CRED_ACQ pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:44.676000 audit[5366]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed7c268d0 a2=3 a3=0 items=0 ppid=1 pid=5366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:44.676000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:44.680456 sshd[5366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:29:44.691595 systemd[1]: Started session-14.scope.
Feb  9 19:29:44.692365 systemd-logind[1552]: New session 14 of user core.
Feb  9 19:29:44.703000 audit[5366]: USER_START pid=5366 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:44.705000 audit[5369]: CRED_ACQ pid=5369 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:44.922986 sshd[5366]: pam_unix(sshd:session): session closed for user core
Feb  9 19:29:44.922000 audit[5366]: USER_END pid=5366 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:44.923000 audit[5366]: CRED_DISP pid=5366 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:44.927809 systemd-logind[1552]: Session 14 logged out. Waiting for processes to exit.
Feb  9 19:29:44.928074 systemd[1]: sshd@13-172.31.21.113:22-139.178.68.195:42296.service: Deactivated successfully.
Feb  9 19:29:44.929496 systemd[1]: session-14.scope: Deactivated successfully.
Feb  9 19:29:44.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.113:22-139.178.68.195:42296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:44.930649 systemd-logind[1552]: Removed session 14.
Feb  9 19:29:47.865141 systemd[1]: run-containerd-runc-k8s.io-ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1-runc.R9B13J.mount: Deactivated successfully.
Feb  9 19:29:49.955188 systemd[1]: Started sshd@14-172.31.21.113:22-139.178.68.195:52310.service.
Feb  9 19:29:49.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.113:22-139.178.68.195:52310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:49.958518 kernel: kauditd_printk_skb: 23 callbacks suppressed
Feb  9 19:29:49.958637 kernel: audit: type=1130 audit(1707506989.953:1461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.113:22-139.178.68.195:52310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:50.131000 audit[5429]: USER_ACCT pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.139605 sshd[5429]: Accepted publickey for core from 139.178.68.195 port 52310 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:29:50.140003 kernel: audit: type=1101 audit(1707506990.131:1462): pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.138000 audit[5429]: CRED_ACQ pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.140781 sshd[5429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:29:50.149277 kernel: audit: type=1103 audit(1707506990.138:1463): pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.149387 kernel: audit: type=1006 audit(1707506990.138:1464): pid=5429 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1
Feb  9 19:29:50.138000 audit[5429]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe19112480 a2=3 a3=0 items=0 ppid=1 pid=5429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:50.159549 kernel: audit: type=1300 audit(1707506990.138:1464): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe19112480 a2=3 a3=0 items=0 ppid=1 pid=5429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:50.160414 kernel: audit: type=1327 audit(1707506990.138:1464): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:50.138000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:50.156453 systemd-logind[1552]: New session 15 of user core.
Feb  9 19:29:50.159824 systemd[1]: Started session-15.scope.
Feb  9 19:29:50.166000 audit[5429]: USER_START pid=5429 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.177709 kernel: audit: type=1105 audit(1707506990.166:1465): pid=5429 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.177917 kernel: audit: type=1103 audit(1707506990.172:1466): pid=5431 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.172000 audit[5431]: CRED_ACQ pid=5431 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.440525 kernel: audit: type=1106 audit(1707506990.428:1467): pid=5429 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.428000 audit[5429]: USER_END pid=5429 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.429273 sshd[5429]: pam_unix(sshd:session): session closed for user core
Feb  9 19:29:50.439036 systemd[1]: sshd@14-172.31.21.113:22-139.178.68.195:52310.service: Deactivated successfully.
Feb  9 19:29:50.448425 kernel: audit: type=1104 audit(1707506990.428:1468): pid=5429 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.428000 audit[5429]: CRED_DISP pid=5429 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:50.440095 systemd[1]: session-15.scope: Deactivated successfully.
Feb  9 19:29:50.440865 systemd-logind[1552]: Session 15 logged out. Waiting for processes to exit.
Feb  9 19:29:50.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.113:22-139.178.68.195:52310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:50.448398 systemd-logind[1552]: Removed session 15.
Feb  9 19:29:55.460708 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:29:55.460861 kernel: audit: type=1130 audit(1707506995.456:1470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.113:22-139.178.68.195:52326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:55.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.113:22-139.178.68.195:52326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:29:55.458002 systemd[1]: Started sshd@15-172.31.21.113:22-139.178.68.195:52326.service.
Feb  9 19:29:55.623000 audit[5445]: USER_ACCT pid=5445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.625526 sshd[5445]: Accepted publickey for core from 139.178.68.195 port 52326 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:29:55.633721 kernel: audit: type=1101 audit(1707506995.623:1471): pid=5445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.632000 audit[5445]: CRED_ACQ pid=5445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.635753 sshd[5445]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:29:55.644847 kernel: audit: type=1103 audit(1707506995.632:1472): pid=5445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.644972 kernel: audit: type=1006 audit(1707506995.632:1473): pid=5445 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1
Feb  9 19:29:55.645843 kernel: audit: type=1300 audit(1707506995.632:1473): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6607e0c0 a2=3 a3=0 items=0 ppid=1 pid=5445 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:55.632000 audit[5445]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6607e0c0 a2=3 a3=0 items=0 ppid=1 pid=5445 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:29:55.652555 kernel: audit: type=1327 audit(1707506995.632:1473): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:55.632000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:29:55.654697 systemd[1]: Started session-16.scope.
Feb  9 19:29:55.655762 systemd-logind[1552]: New session 16 of user core.
Feb  9 19:29:55.660000 audit[5445]: USER_START pid=5445 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.664000 audit[5447]: CRED_ACQ pid=5447 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.676580 kernel: audit: type=1105 audit(1707506995.660:1474): pid=5445 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.676752 kernel: audit: type=1103 audit(1707506995.664:1475): pid=5447 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.887535 sshd[5445]: pam_unix(sshd:session): session closed for user core
Feb  9 19:29:55.888000 audit[5445]: USER_END pid=5445 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.891726 systemd[1]: sshd@15-172.31.21.113:22-139.178.68.195:52326.service: Deactivated successfully.
Feb  9 19:29:55.893434 systemd[1]: session-16.scope: Deactivated successfully.
Feb  9 19:29:55.888000 audit[5445]: CRED_DISP pid=5445 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.897548 systemd-logind[1552]: Session 16 logged out. Waiting for processes to exit.
Feb  9 19:29:55.898896 systemd-logind[1552]: Removed session 16.
Feb  9 19:29:55.903182 kernel: audit: type=1106 audit(1707506995.888:1476): pid=5445 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.903287 kernel: audit: type=1104 audit(1707506995.888:1477): pid=5445 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:29:55.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.113:22-139.178.68.195:52326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:00.917252 systemd[1]: Started sshd@16-172.31.21.113:22-139.178.68.195:51680.service.
Feb  9 19:30:00.925362 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:30:00.925482 kernel: audit: type=1130 audit(1707507000.916:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.113:22-139.178.68.195:51680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:00.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.113:22-139.178.68.195:51680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:01.088000 audit[5457]: USER_ACCT pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.096809 kernel: audit: type=1101 audit(1707507001.088:1480): pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.096868 sshd[5457]: Accepted publickey for core from 139.178.68.195 port 51680 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:01.095000 audit[5457]: CRED_ACQ pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.098079 sshd[5457]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:01.103928 kernel: audit: type=1103 audit(1707507001.095:1481): pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.104157 kernel: audit: type=1006 audit(1707507001.095:1482): pid=5457 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1
Feb  9 19:30:01.095000 audit[5457]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06b83470 a2=3 a3=0 items=0 ppid=1 pid=5457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:01.109398 systemd[1]: Started session-17.scope.
Feb  9 19:30:01.110638 systemd-logind[1552]: New session 17 of user core.
Feb  9 19:30:01.114889 kernel: audit: type=1300 audit(1707507001.095:1482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06b83470 a2=3 a3=0 items=0 ppid=1 pid=5457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:01.115010 kernel: audit: type=1327 audit(1707507001.095:1482): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:01.095000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:01.117000 audit[5457]: USER_START pid=5457 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.127714 kernel: audit: type=1105 audit(1707507001.117:1483): pid=5457 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.127870 kernel: audit: type=1103 audit(1707507001.117:1484): pid=5459 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.117000 audit[5459]: CRED_ACQ pid=5459 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.401256 sshd[5457]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:01.402000 audit[5457]: USER_END pid=5457 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.406497 systemd[1]: sshd@16-172.31.21.113:22-139.178.68.195:51680.service: Deactivated successfully.
Feb  9 19:30:01.407701 systemd[1]: session-17.scope: Deactivated successfully.
Feb  9 19:30:01.410703 kernel: audit: type=1106 audit(1707507001.402:1485): pid=5457 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.402000 audit[5457]: CRED_DISP pid=5457 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:01.415900 systemd-logind[1552]: Session 17 logged out. Waiting for processes to exit.
Feb  9 19:30:01.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.113:22-139.178.68.195:51680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:01.418098 systemd-logind[1552]: Removed session 17.
Feb  9 19:30:01.419931 kernel: audit: type=1104 audit(1707507001.402:1486): pid=5457 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:04.340000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:04.340000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000af55f0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:30:04.340000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:30:04.342000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:04.342000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000e48720 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:30:04.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:30:06.310726 kernel: kauditd_printk_skb: 7 callbacks suppressed
Feb  9 19:30:06.310865 kernel: audit: type=1400 audit(1707507006.304:1490): avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.304000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.304000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c002b9d040 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:30:06.321078 kernel: audit: type=1300 audit(1707507006.304:1490): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c002b9d040 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:30:06.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:30:06.304000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.335771 kernel: audit: type=1327 audit(1707507006.304:1490): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:30:06.335959 kernel: audit: type=1400 audit(1707507006.304:1491): avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.335997 kernel: audit: type=1300 audit(1707507006.304:1491): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c129e30 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:30:06.304000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c129e30 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:30:06.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:30:06.353033 kernel: audit: type=1327 audit(1707507006.304:1491): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:30:06.353239 kernel: audit: type=1400 audit(1707507006.305:1492): avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.305000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.305000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c129e90 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:30:06.369718 kernel: audit: type=1300 audit(1707507006.305:1492): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c129e90 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:30:06.369962 kernel: audit: type=1327 audit(1707507006.305:1492): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:30:06.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:30:06.305000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.384204 kernel: audit: type=1400 audit(1707507006.305:1493): avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.305000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c002b9d080 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:30:06.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:30:06.305000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.305000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c129ef0 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:30:06.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:30:06.304000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:06.304000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00c0eccc0 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:30:06.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:30:06.428247 systemd[1]: Started sshd@17-172.31.21.113:22-139.178.68.195:41796.service.
Feb  9 19:30:06.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.113:22-139.178.68.195:41796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:06.593000 audit[5470]: USER_ACCT pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:06.597031 sshd[5470]: Accepted publickey for core from 139.178.68.195 port 41796 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:06.599000 audit[5470]: CRED_ACQ pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:06.599000 audit[5470]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff40c5d870 a2=3 a3=0 items=0 ppid=1 pid=5470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:06.599000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:06.601750 sshd[5470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:06.615840 systemd[1]: Started session-18.scope.
Feb  9 19:30:06.621102 systemd-logind[1552]: New session 18 of user core.
Feb  9 19:30:06.636000 audit[5470]: USER_START pid=5470 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:06.643000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:06.930051 sshd[5470]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:06.930000 audit[5470]: USER_END pid=5470 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:06.930000 audit[5470]: CRED_DISP pid=5470 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:06.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.113:22-139.178.68.195:41796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:06.934301 systemd[1]: sshd@17-172.31.21.113:22-139.178.68.195:41796.service: Deactivated successfully.
Feb  9 19:30:06.935349 systemd[1]: session-18.scope: Deactivated successfully.
Feb  9 19:30:06.936210 systemd-logind[1552]: Session 18 logged out. Waiting for processes to exit.
Feb  9 19:30:06.939388 systemd-logind[1552]: Removed session 18.
Feb  9 19:30:09.366000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:09.366000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e9ea20 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:30:09.366000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:30:09.378000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:09.378000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010e4ce0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:30:09.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:30:09.382000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:09.382000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e9ea60 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:30:09.382000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:30:09.444000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:30:09.444000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010e50a0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:30:09.444000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:30:10.648876 kubelet[2906]: I0209 19:30:10.648815    2906 topology_manager.go:210] "Topology Admit Handler"
Feb  9 19:30:10.659628 systemd[1]: Created slice kubepods-besteffort-pod989ca633_17a9_4fbb_b86d_b70bafe730d8.slice.
Feb  9 19:30:10.762394 kubelet[2906]: I0209 19:30:10.762358    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/989ca633-17a9-4fbb-b86d-b70bafe730d8-calico-apiserver-certs\") pod \"calico-apiserver-d4455d86c-rj6cb\" (UID: \"989ca633-17a9-4fbb-b86d-b70bafe730d8\") " pod="calico-apiserver/calico-apiserver-d4455d86c-rj6cb"
Feb  9 19:30:10.763821 kubelet[2906]: I0209 19:30:10.763798    2906 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g488d\" (UniqueName: \"kubernetes.io/projected/989ca633-17a9-4fbb-b86d-b70bafe730d8-kube-api-access-g488d\") pod \"calico-apiserver-d4455d86c-rj6cb\" (UID: \"989ca633-17a9-4fbb-b86d-b70bafe730d8\") " pod="calico-apiserver/calico-apiserver-d4455d86c-rj6cb"
Feb  9 19:30:10.867731 kubelet[2906]: E0209 19:30:10.867700    2906 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found
Feb  9 19:30:10.865000 audit[5508]: NETFILTER_CFG table=filter:127 family=2 entries=7 op=nft_register_rule pid=5508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:10.865000 audit[5508]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff9244e490 a2=0 a3=7fff9244e47c items=0 ppid=3117 pid=5508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:10.865000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:10.870727 kubelet[2906]: E0209 19:30:10.870059    2906 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/989ca633-17a9-4fbb-b86d-b70bafe730d8-calico-apiserver-certs podName:989ca633-17a9-4fbb-b86d-b70bafe730d8 nodeName:}" failed. No retries permitted until 2024-02-09 19:30:11.367978251 +0000 UTC m=+121.798974882 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/989ca633-17a9-4fbb-b86d-b70bafe730d8-calico-apiserver-certs") pod "calico-apiserver-d4455d86c-rj6cb" (UID: "989ca633-17a9-4fbb-b86d-b70bafe730d8") : secret "calico-apiserver-certs" not found
Feb  9 19:30:10.898000 audit[5508]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=5508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:10.898000 audit[5508]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff9244e490 a2=0 a3=7fff9244e47c items=0 ppid=3117 pid=5508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:10.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:11.029000 audit[5535]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:11.029000 audit[5535]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdc7eb8ed0 a2=0 a3=7ffdc7eb8ebc items=0 ppid=3117 pid=5535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:11.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:11.034000 audit[5535]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=5535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:11.034000 audit[5535]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffdc7eb8ed0 a2=0 a3=7ffdc7eb8ebc items=0 ppid=3117 pid=5535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:11.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:11.575939 env[1569]: time="2024-02-09T19:30:11.575865556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d4455d86c-rj6cb,Uid:989ca633-17a9-4fbb-b86d-b70bafe730d8,Namespace:calico-apiserver,Attempt:0,}"
Feb  9 19:30:11.966524 kernel: kauditd_printk_skb: 43 callbacks suppressed
Feb  9 19:30:11.966640 kernel: audit: type=1130 audit(1707507011.957:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.113:22-139.178.68.195:41804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:11.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.113:22-139.178.68.195:41804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:11.958922 systemd[1]: Started sshd@18-172.31.21.113:22-139.178.68.195:41804.service.
Feb  9 19:30:12.050707 systemd-networkd[1376]: cali7a8522302bc: Link UP
Feb  9 19:30:12.057749 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 19:30:12.057867 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7a8522302bc: link becomes ready
Feb  9 19:30:12.056854 (udev-worker)[5558]: Network interface NamePolicy= disabled on kernel command line.
Feb  9 19:30:12.058518 systemd-networkd[1376]: cali7a8522302bc: Gained carrier
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.889 [INFO][5537] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0 calico-apiserver-d4455d86c- calico-apiserver  989ca633-17a9-4fbb-b86d-b70bafe730d8 1050 0 2024-02-09 19:30:10 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:d4455d86c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s  ip-172-31-21-113  calico-apiserver-d4455d86c-rj6cb eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7a8522302bc  [] []}} ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Namespace="calico-apiserver" Pod="calico-apiserver-d4455d86c-rj6cb" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.891 [INFO][5537] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Namespace="calico-apiserver" Pod="calico-apiserver-d4455d86c-rj6cb" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.926 [INFO][5548] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" HandleID="k8s-pod-network.ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Workload="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.937 [INFO][5548] ipam_plugin.go 268: Auto assigning IP ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" HandleID="k8s-pod-network.ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Workload="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d820), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-21-113", "pod":"calico-apiserver-d4455d86c-rj6cb", "timestamp":"2024-02-09 19:30:11.926470175 +0000 UTC"}, Hostname:"ip-172-31-21-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.937 [INFO][5548] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.937 [INFO][5548] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.937 [INFO][5548] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-113'
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.941 [INFO][5548] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" host="ip-172-31-21-113"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.956 [INFO][5548] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-113"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.968 [INFO][5548] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.971 [INFO][5548] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.977 [INFO][5548] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ip-172-31-21-113"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.978 [INFO][5548] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" host="ip-172-31-21-113"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.985 [INFO][5548] ipam.go 1682: Creating new handle: k8s-pod-network.ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:11.995 [INFO][5548] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" host="ip-172-31-21-113"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:12.041 [INFO][5548] ipam.go 1216: Successfully claimed IPs: [192.168.121.69/26] block=192.168.121.64/26 handle="k8s-pod-network.ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" host="ip-172-31-21-113"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:12.041 [INFO][5548] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.69/26] handle="k8s-pod-network.ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" host="ip-172-31-21-113"
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:12.041 [INFO][5548] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 19:30:12.082148 env[1569]: 2024-02-09 19:30:12.041 [INFO][5548] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.69/26] IPv6=[] ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" HandleID="k8s-pod-network.ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Workload="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0"
Feb  9 19:30:12.083182 env[1569]: 2024-02-09 19:30:12.046 [INFO][5537] k8s.go 385: Populated endpoint ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Namespace="calico-apiserver" Pod="calico-apiserver-d4455d86c-rj6cb" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0", GenerateName:"calico-apiserver-d4455d86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"989ca633-17a9-4fbb-b86d-b70bafe730d8", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 30, 10, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d4455d86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"", Pod:"calico-apiserver-d4455d86c-rj6cb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.121.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7a8522302bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:30:12.083182 env[1569]: 2024-02-09 19:30:12.047 [INFO][5537] k8s.go 386: Calico CNI using IPs: [192.168.121.69/32] ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Namespace="calico-apiserver" Pod="calico-apiserver-d4455d86c-rj6cb" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0"
Feb  9 19:30:12.083182 env[1569]: 2024-02-09 19:30:12.047 [INFO][5537] dataplane_linux.go 68: Setting the host side veth name to cali7a8522302bc ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Namespace="calico-apiserver" Pod="calico-apiserver-d4455d86c-rj6cb" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0"
Feb  9 19:30:12.083182 env[1569]: 2024-02-09 19:30:12.060 [INFO][5537] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Namespace="calico-apiserver" Pod="calico-apiserver-d4455d86c-rj6cb" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0"
Feb  9 19:30:12.083182 env[1569]: 2024-02-09 19:30:12.060 [INFO][5537] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Namespace="calico-apiserver" Pod="calico-apiserver-d4455d86c-rj6cb" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0", GenerateName:"calico-apiserver-d4455d86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"989ca633-17a9-4fbb-b86d-b70bafe730d8", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 30, 10, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d4455d86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-113", ContainerID:"ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8", Pod:"calico-apiserver-d4455d86c-rj6cb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.121.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7a8522302bc", MAC:"7a:fd:14:ef:bb:f5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 19:30:12.083182 env[1569]: 2024-02-09 19:30:12.075 [INFO][5537] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8" Namespace="calico-apiserver" Pod="calico-apiserver-d4455d86c-rj6cb" WorkloadEndpoint="ip--172--31--21--113-k8s-calico--apiserver--d4455d86c--rj6cb-eth0"
Feb  9 19:30:12.140421 env[1569]: time="2024-02-09T19:30:12.138130704Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 19:30:12.140421 env[1569]: time="2024-02-09T19:30:12.138257624Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 19:30:12.140421 env[1569]: time="2024-02-09T19:30:12.138321656Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 19:30:12.140421 env[1569]: time="2024-02-09T19:30:12.138899071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8 pid=5579 runtime=io.containerd.runc.v2
Feb  9 19:30:12.174000 audit[5599]: NETFILTER_CFG table=filter:131 family=2 entries=59 op=nft_register_chain pid=5599 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:30:12.185072 kernel: audit: type=1325 audit(1707507012.174:1514): table=filter:131 family=2 entries=59 op=nft_register_chain pid=5599 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 19:30:12.185181 kernel: audit: type=1300 audit(1707507012.174:1514): arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffd05af2400 a2=0 a3=7ffd05af23ec items=0 ppid=4083 pid=5599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:12.174000 audit[5599]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffd05af2400 a2=0 a3=7ffd05af23ec items=0 ppid=4083 pid=5599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:12.200726 systemd[1]: run-containerd-runc-k8s.io-ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8-runc.2UoAky.mount: Deactivated successfully.
Feb  9 19:30:12.174000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:30:12.208031 systemd[1]: Started cri-containerd-ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8.scope.
Feb  9 19:30:12.209799 kernel: audit: type=1327 audit(1707507012.174:1514): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 19:30:12.253000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.253000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.265508 kernel: audit: type=1400 audit(1707507012.253:1515): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.265624 kernel: audit: type=1400 audit(1707507012.253:1516): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.265653 kernel: audit: type=1400 audit(1707507012.253:1517): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.253000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.265818 sshd[5556]: Accepted publickey for core from 139.178.68.195 port 41804 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:12.253000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.275542 kernel: audit: type=1400 audit(1707507012.253:1518): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.275736 kernel: audit: type=1400 audit(1707507012.253:1519): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.253000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.276136 sshd[5556]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:12.253000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.285740 kernel: audit: type=1400 audit(1707507012.253:1520): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.253000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.253000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.253000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.258000 audit[5556]: USER_ACCT pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:12.263000 audit[5556]: CRED_ACQ pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:12.263000 audit[5556]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb9554ff0 a2=3 a3=0 items=0 ppid=1 pid=5556 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:12.263000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:12.268000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit: BPF prog-id=192 op=LOAD
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5579 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:12.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643435396366333730633164333636393137393165306366343937
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5579 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:12.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643435396366333730633164333636393137393165306366343937
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.268000 audit: BPF prog-id=193 op=LOAD
Feb  9 19:30:12.268000 audit[5591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d46d0 items=0 ppid=5579 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:12.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643435396366333730633164333636393137393165306366343937
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit: BPF prog-id=194 op=LOAD
Feb  9 19:30:12.288000 audit[5591]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d4718 items=0 ppid=5579 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:12.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643435396366333730633164333636393137393165306366343937
Feb  9 19:30:12.288000 audit: BPF prog-id=194 op=UNLOAD
Feb  9 19:30:12.288000 audit: BPF prog-id=193 op=UNLOAD
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { perfmon } for  pid=5591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit[5591]: AVC avc:  denied  { bpf } for  pid=5591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:12.288000 audit: BPF prog-id=195 op=LOAD
Feb  9 19:30:12.288000 audit[5591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d4b28 items=0 ppid=5579 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:12.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643435396366333730633164333636393137393165306366343937
Feb  9 19:30:12.296574 systemd[1]: Started session-19.scope.
Feb  9 19:30:12.297868 systemd-logind[1552]: New session 19 of user core.
Feb  9 19:30:12.311000 audit[5556]: USER_START pid=5556 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:12.317000 audit[5609]: CRED_ACQ pid=5609 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:12.354488 env[1569]: time="2024-02-09T19:30:12.354441363Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d4455d86c-rj6cb,Uid:989ca633-17a9-4fbb-b86d-b70bafe730d8,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8\""
Feb  9 19:30:12.356963 env[1569]: time="2024-02-09T19:30:12.356926950Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\""
Feb  9 19:30:12.596790 sshd[5556]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:12.599000 audit[5556]: USER_END pid=5556 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:12.600000 audit[5556]: CRED_DISP pid=5556 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:12.604033 systemd[1]: sshd@18-172.31.21.113:22-139.178.68.195:41804.service: Deactivated successfully.
Feb  9 19:30:12.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.113:22-139.178.68.195:41804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:12.605977 systemd[1]: session-19.scope: Deactivated successfully.
Feb  9 19:30:12.606926 systemd-logind[1552]: Session 19 logged out. Waiting for processes to exit.
Feb  9 19:30:12.609326 systemd-logind[1552]: Removed session 19.
Feb  9 19:30:12.626863 systemd[1]: Started sshd@19-172.31.21.113:22-139.178.68.195:41820.service.
Feb  9 19:30:12.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.113:22-139.178.68.195:41820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:12.794000 audit[5627]: USER_ACCT pid=5627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:12.798076 sshd[5627]: Accepted publickey for core from 139.178.68.195 port 41820 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:12.796000 audit[5627]: CRED_ACQ pid=5627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:12.796000 audit[5627]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc766b3670 a2=3 a3=0 items=0 ppid=1 pid=5627 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:12.796000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:12.799809 sshd[5627]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:12.806912 systemd-logind[1552]: New session 20 of user core.
Feb  9 19:30:12.807510 systemd[1]: Started session-20.scope.
Feb  9 19:30:12.815000 audit[5627]: USER_START pid=5627 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:12.817000 audit[5629]: CRED_ACQ pid=5629 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:13.362926 systemd-networkd[1376]: cali7a8522302bc: Gained IPv6LL
Feb  9 19:30:13.808770 sshd[5627]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:13.809000 audit[5627]: USER_END pid=5627 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:13.809000 audit[5627]: CRED_DISP pid=5627 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:13.851383 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount444550659.mount: Deactivated successfully.
Feb  9 19:30:13.852532 systemd[1]: sshd@19-172.31.21.113:22-139.178.68.195:41820.service: Deactivated successfully.
Feb  9 19:30:13.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.113:22-139.178.68.195:41820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:13.857983 systemd[1]: session-20.scope: Deactivated successfully.
Feb  9 19:30:13.860851 systemd-logind[1552]: Session 20 logged out. Waiting for processes to exit.
Feb  9 19:30:13.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.113:22-139.178.68.195:41836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:13.867037 systemd[1]: Started sshd@20-172.31.21.113:22-139.178.68.195:41836.service.
Feb  9 19:30:13.869083 systemd-logind[1552]: Removed session 20.
Feb  9 19:30:14.081000 audit[5638]: USER_ACCT pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:14.084156 sshd[5638]: Accepted publickey for core from 139.178.68.195 port 41836 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:14.089000 audit[5638]: CRED_ACQ pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:14.089000 audit[5638]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecd02f0d0 a2=3 a3=0 items=0 ppid=1 pid=5638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:14.089000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:14.093290 sshd[5638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:14.117378 systemd[1]: Started session-21.scope.
Feb  9 19:30:14.119792 systemd-logind[1552]: New session 21 of user core.
Feb  9 19:30:14.132000 audit[5638]: USER_START pid=5638 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:14.135000 audit[5640]: CRED_ACQ pid=5640 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:17.740824 env[1569]: time="2024-02-09T19:30:17.740773603Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:30:17.744515 env[1569]: time="2024-02-09T19:30:17.744469969Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:30:17.747882 env[1569]: time="2024-02-09T19:30:17.747829465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:30:17.751079 env[1569]: time="2024-02-09T19:30:17.751035510Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 19:30:17.754602 env[1569]: time="2024-02-09T19:30:17.754341819Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\""
Feb  9 19:30:17.771901 env[1569]: time="2024-02-09T19:30:17.771805003Z" level=info msg="CreateContainer within sandbox \"ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}"
Feb  9 19:30:17.812901 env[1569]: time="2024-02-09T19:30:17.812799257Z" level=info msg="CreateContainer within sandbox \"ecd459cf370c1d36691791e0cf497c93d3432e4f5e52450a7f0203ac441b13d8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c7dc58e3a7d9da6ccfa6447b32e298131fb5b635d5d0e39c8f8fe22fc00b5a67\""
Feb  9 19:30:17.819253 env[1569]: time="2024-02-09T19:30:17.819205127Z" level=info msg="StartContainer for \"c7dc58e3a7d9da6ccfa6447b32e298131fb5b635d5d0e39c8f8fe22fc00b5a67\""
Feb  9 19:30:17.890059 systemd[1]: run-containerd-runc-k8s.io-ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1-runc.8rw0b1.mount: Deactivated successfully.
Feb  9 19:30:17.948393 systemd[1]: Started cri-containerd-c7dc58e3a7d9da6ccfa6447b32e298131fb5b635d5d0e39c8f8fe22fc00b5a67.scope.
Feb  9 19:30:17.989586 kernel: kauditd_printk_skb: 80 callbacks suppressed
Feb  9 19:30:17.996888 kernel: audit: type=1400 audit(1707507017.981:1556): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:18.017569 kernel: audit: type=1400 audit(1707507017.981:1557): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:18.018544 kernel: audit: type=1400 audit(1707507017.981:1558): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:18.025192 kernel: audit: type=1400 audit(1707507017.981:1559): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:18.032106 kernel: audit: type=1400 audit(1707507017.981:1560): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:18.038639 kernel: audit: type=1400 audit(1707507017.981:1561): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:18.044905 kernel: audit: type=1400 audit(1707507017.981:1562): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:18.058256 kernel: audit: type=1400 audit(1707507017.981:1563): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:18.059555 kernel: audit: type=1400 audit(1707507017.981:1564): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.982000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:18.066716 kernel: audit: type=1400 audit(1707507017.982:1565): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.983000 audit: BPF prog-id=196 op=LOAD
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5579 pid=5697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:17.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646335386533613764396461366363666136343437623332653239
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5579 pid=5697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:17.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646335386533613764396461366363666136343437623332653239
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.984000 audit: BPF prog-id=197 op=LOAD
Feb  9 19:30:17.984000 audit[5697]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b2600 items=0 ppid=5579 pid=5697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:17.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646335386533613764396461366363666136343437623332653239
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit: BPF prog-id=198 op=LOAD
Feb  9 19:30:17.987000 audit[5697]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b2648 items=0 ppid=5579 pid=5697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:17.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646335386533613764396461366363666136343437623332653239
Feb  9 19:30:17.987000 audit: BPF prog-id=198 op=UNLOAD
Feb  9 19:30:17.987000 audit: BPF prog-id=197 op=UNLOAD
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { perfmon } for  pid=5697 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit[5697]: AVC avc:  denied  { bpf } for  pid=5697 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:30:17.987000 audit: BPF prog-id=199 op=LOAD
Feb  9 19:30:17.987000 audit[5697]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b2a58 items=0 ppid=5579 pid=5697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:17.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646335386533613764396461366363666136343437623332653239
Feb  9 19:30:18.065000 audit[5726]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=5726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:18.065000 audit[5726]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd95a830b0 a2=0 a3=7ffd95a8309c items=0 ppid=3117 pid=5726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:18.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:18.071000 audit[5726]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=5726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:18.071000 audit[5726]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd95a830b0 a2=0 a3=7ffd95a8309c items=0 ppid=3117 pid=5726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:18.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:18.129672 env[1569]: time="2024-02-09T19:30:18.129614806Z" level=info msg="StartContainer for \"c7dc58e3a7d9da6ccfa6447b32e298131fb5b635d5d0e39c8f8fe22fc00b5a67\" returns successfully"
Feb  9 19:30:18.670000 audit[5767]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=5767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:18.670000 audit[5767]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc01bc2180 a2=0 a3=7ffc01bc216c items=0 ppid=3117 pid=5767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:18.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:18.674000 audit[5767]: NETFILTER_CFG table=nat:135 family=2 entries=78 op=nft_register_rule pid=5767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:18.674000 audit[5767]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc01bc2180 a2=0 a3=7ffc01bc216c items=0 ppid=3117 pid=5767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:18.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:18.799246 systemd[1]: run-containerd-runc-k8s.io-c7dc58e3a7d9da6ccfa6447b32e298131fb5b635d5d0e39c8f8fe22fc00b5a67-runc.pAbTS0.mount: Deactivated successfully.
Feb  9 19:30:18.855231 systemd[1]: run-containerd-runc-k8s.io-cd35bce6c6b91eb8b65979efac4163371c7be9f6d3d67f85ab5285ff63d31f3a-runc.PC710q.mount: Deactivated successfully.
Feb  9 19:30:19.256510 sshd[5638]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:19.261000 audit[5638]: USER_END pid=5638 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:19.262000 audit[5638]: CRED_DISP pid=5638 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:19.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.113:22-139.178.68.195:39866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:19.276380 systemd[1]: Started sshd@21-172.31.21.113:22-139.178.68.195:39866.service.
Feb  9 19:30:19.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.113:22-139.178.68.195:41836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:19.280249 systemd[1]: sshd@20-172.31.21.113:22-139.178.68.195:41836.service: Deactivated successfully.
Feb  9 19:30:19.282544 systemd[1]: session-21.scope: Deactivated successfully.
Feb  9 19:30:19.287793 systemd-logind[1552]: Session 21 logged out. Waiting for processes to exit.
Feb  9 19:30:19.295618 systemd-logind[1552]: Removed session 21.
Feb  9 19:30:19.456000 audit[5816]: NETFILTER_CFG table=filter:136 family=2 entries=20 op=nft_register_rule pid=5816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:19.456000 audit[5816]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffccce14810 a2=0 a3=7ffccce147fc items=0 ppid=3117 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:19.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:19.462000 audit[5816]: NETFILTER_CFG table=nat:137 family=2 entries=78 op=nft_register_rule pid=5816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:19.462000 audit[5816]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffccce14810 a2=0 a3=7ffccce147fc items=0 ppid=3117 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:19.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:19.494000 audit[5798]: USER_ACCT pid=5798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:19.497586 sshd[5798]: Accepted publickey for core from 139.178.68.195 port 39866 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:19.495000 audit[5798]: CRED_ACQ pid=5798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:19.495000 audit[5798]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd36b62780 a2=3 a3=0 items=0 ppid=1 pid=5798 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:19.495000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:19.498560 sshd[5798]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:19.507394 systemd[1]: Started session-22.scope.
Feb  9 19:30:19.508791 systemd-logind[1552]: New session 22 of user core.
Feb  9 19:30:19.515000 audit[5798]: USER_START pid=5798 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:19.517000 audit[5817]: CRED_ACQ pid=5817 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:19.893000 audit[5715]: AVC avc:  denied  { watch } for  pid=5715 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_30_11.1680994519/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c478,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c478,c675 tclass=file permissive=0
Feb  9 19:30:19.893000 audit[5715]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b67fe0 a2=fc6 a3=0 items=0 ppid=5579 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c478,c675 key=(null)
Feb  9 19:30:19.893000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C
Feb  9 19:30:20.362086 sshd[5798]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:20.362000 audit[5798]: USER_END pid=5798 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:20.362000 audit[5798]: CRED_DISP pid=5798 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:20.367391 systemd-logind[1552]: Session 22 logged out. Waiting for processes to exit.
Feb  9 19:30:20.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.113:22-139.178.68.195:39866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:20.370163 systemd[1]: sshd@21-172.31.21.113:22-139.178.68.195:39866.service: Deactivated successfully.
Feb  9 19:30:20.371421 systemd[1]: session-22.scope: Deactivated successfully.
Feb  9 19:30:20.375004 systemd-logind[1552]: Removed session 22.
Feb  9 19:30:20.392283 systemd[1]: Started sshd@22-172.31.21.113:22-139.178.68.195:39878.service.
Feb  9 19:30:20.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.113:22-139.178.68.195:39878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:20.521000 audit[5853]: NETFILTER_CFG table=filter:138 family=2 entries=32 op=nft_register_rule pid=5853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:20.521000 audit[5853]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffd23b9fb60 a2=0 a3=7ffd23b9fb4c items=0 ppid=3117 pid=5853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:20.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:20.523000 audit[5853]: NETFILTER_CFG table=nat:139 family=2 entries=78 op=nft_register_rule pid=5853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:20.523000 audit[5853]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd23b9fb60 a2=0 a3=7ffd23b9fb4c items=0 ppid=3117 pid=5853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:20.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:20.580000 audit[5826]: USER_ACCT pid=5826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:20.583199 sshd[5826]: Accepted publickey for core from 139.178.68.195 port 39878 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:20.581000 audit[5826]: CRED_ACQ pid=5826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:20.582000 audit[5826]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe80c93ea0 a2=3 a3=0 items=0 ppid=1 pid=5826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:20.582000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:20.584147 sshd[5826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:20.591046 systemd[1]: Started session-23.scope.
Feb  9 19:30:20.593284 systemd-logind[1552]: New session 23 of user core.
Feb  9 19:30:20.599000 audit[5826]: USER_START pid=5826 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:20.601000 audit[5854]: CRED_ACQ pid=5854 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:20.850396 sshd[5826]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:20.852000 audit[5826]: USER_END pid=5826 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:20.852000 audit[5826]: CRED_DISP pid=5826 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:20.857561 systemd[1]: sshd@22-172.31.21.113:22-139.178.68.195:39878.service: Deactivated successfully.
Feb  9 19:30:20.859411 systemd[1]: session-23.scope: Deactivated successfully.
Feb  9 19:30:20.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.113:22-139.178.68.195:39878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:20.860656 systemd-logind[1552]: Session 23 logged out. Waiting for processes to exit.
Feb  9 19:30:20.861834 systemd-logind[1552]: Removed session 23.
Feb  9 19:30:25.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.113:22-139.178.68.195:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:25.877025 systemd[1]: Started sshd@23-172.31.21.113:22-139.178.68.195:39888.service.
Feb  9 19:30:25.879301 kernel: kauditd_printk_skb: 99 callbacks suppressed
Feb  9 19:30:25.879393 kernel: audit: type=1130 audit(1707507025.876:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.113:22-139.178.68.195:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:26.069000 audit[5878]: USER_ACCT pid=5878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.078627 sshd[5878]: Accepted publickey for core from 139.178.68.195 port 39888 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:26.079007 kernel: audit: type=1101 audit(1707507026.069:1605): pid=5878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.087370 kernel: audit: type=1103 audit(1707507026.076:1606): pid=5878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.076000 audit[5878]: CRED_ACQ pid=5878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.079061 sshd[5878]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:26.091006 systemd[1]: Started session-24.scope.
Feb  9 19:30:26.092159 systemd-logind[1552]: New session 24 of user core.
Feb  9 19:30:26.094975 kernel: audit: type=1006 audit(1707507026.076:1607): pid=5878 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1
Feb  9 19:30:26.076000 audit[5878]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd41779700 a2=3 a3=0 items=0 ppid=1 pid=5878 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:26.106784 kernel: audit: type=1300 audit(1707507026.076:1607): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd41779700 a2=3 a3=0 items=0 ppid=1 pid=5878 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:26.106898 kernel: audit: type=1327 audit(1707507026.076:1607): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:26.076000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:26.108587 kernel: audit: type=1105 audit(1707507026.104:1608): pid=5878 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.104000 audit[5878]: USER_START pid=5878 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.115758 kernel: audit: type=1103 audit(1707507026.105:1609): pid=5880 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.105000 audit[5880]: CRED_ACQ pid=5880 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.403586 sshd[5878]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:26.404000 audit[5878]: USER_END pid=5878 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.409128 systemd[1]: sshd@23-172.31.21.113:22-139.178.68.195:39888.service: Deactivated successfully.
Feb  9 19:30:26.410402 systemd[1]: session-24.scope: Deactivated successfully.
Feb  9 19:30:26.412935 systemd-logind[1552]: Session 24 logged out. Waiting for processes to exit.
Feb  9 19:30:26.404000 audit[5878]: CRED_DISP pid=5878 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.414506 systemd-logind[1552]: Removed session 24.
Feb  9 19:30:26.419387 kernel: audit: type=1106 audit(1707507026.404:1610): pid=5878 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.419601 kernel: audit: type=1104 audit(1707507026.404:1611): pid=5878 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:26.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.113:22-139.178.68.195:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:27.734000 audit[5914]: NETFILTER_CFG table=filter:140 family=2 entries=20 op=nft_register_rule pid=5914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:27.734000 audit[5914]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffdc23d320 a2=0 a3=7fffdc23d30c items=0 ppid=3117 pid=5914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:27.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:27.740000 audit[5914]: NETFILTER_CFG table=nat:141 family=2 entries=162 op=nft_register_chain pid=5914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:27.740000 audit[5914]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7fffdc23d320 a2=0 a3=7fffdc23d30c items=0 ppid=3117 pid=5914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:27.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:31.439899 systemd[1]: Started sshd@24-172.31.21.113:22-139.178.68.195:55894.service.
Feb  9 19:30:31.444091 kernel: kauditd_printk_skb: 7 callbacks suppressed
Feb  9 19:30:31.444254 kernel: audit: type=1130 audit(1707507031.441:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.113:22-139.178.68.195:55894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:31.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.113:22-139.178.68.195:55894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:31.628000 audit[5923]: USER_ACCT pid=5923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.637150 sshd[5923]: Accepted publickey for core from 139.178.68.195 port 55894 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:31.636000 audit[5923]: CRED_ACQ pid=5923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.638069 sshd[5923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:31.643267 kernel: audit: type=1101 audit(1707507031.628:1616): pid=5923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.643314 kernel: audit: type=1103 audit(1707507031.636:1617): pid=5923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.647029 kernel: audit: type=1006 audit(1707507031.636:1618): pid=5923 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1
Feb  9 19:30:31.636000 audit[5923]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6fd3f740 a2=3 a3=0 items=0 ppid=1 pid=5923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:31.653078 kernel: audit: type=1300 audit(1707507031.636:1618): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6fd3f740 a2=3 a3=0 items=0 ppid=1 pid=5923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:31.653280 kernel: audit: type=1327 audit(1707507031.636:1618): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:31.636000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:31.658636 systemd-logind[1552]: New session 25 of user core.
Feb  9 19:30:31.659787 systemd[1]: Started session-25.scope.
Feb  9 19:30:31.665000 audit[5923]: USER_START pid=5923 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.670000 audit[5929]: CRED_ACQ pid=5929 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.681059 kernel: audit: type=1105 audit(1707507031.665:1619): pid=5923 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.681252 kernel: audit: type=1103 audit(1707507031.670:1620): pid=5929 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.939766 sshd[5923]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:31.944000 audit[5923]: USER_END pid=5923 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.952523 systemd-logind[1552]: Session 25 logged out. Waiting for processes to exit.
Feb  9 19:30:31.960868 kernel: audit: type=1106 audit(1707507031.944:1621): pid=5923 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.954534 systemd[1]: sshd@24-172.31.21.113:22-139.178.68.195:55894.service: Deactivated successfully.
Feb  9 19:30:31.957790 systemd[1]: session-25.scope: Deactivated successfully.
Feb  9 19:30:31.944000 audit[5923]: CRED_DISP pid=5923 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:31.964068 systemd-logind[1552]: Removed session 25.
Feb  9 19:30:31.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.113:22-139.178.68.195:55894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:31.972771 kernel: audit: type=1104 audit(1707507031.944:1622): pid=5923 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:36.969765 systemd[1]: Started sshd@25-172.31.21.113:22-139.178.68.195:59162.service.
Feb  9 19:30:36.975117 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:30:36.975378 kernel: audit: type=1130 audit(1707507036.969:1624): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.113:22-139.178.68.195:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:36.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.113:22-139.178.68.195:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:37.144000 audit[5942]: USER_ACCT pid=5942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.152321 sshd[5942]: Accepted publickey for core from 139.178.68.195 port 59162 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:37.152723 kernel: audit: type=1101 audit(1707507037.144:1625): pid=5942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.146000 audit[5942]: CRED_ACQ pid=5942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.153108 sshd[5942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:37.158767 kernel: audit: type=1103 audit(1707507037.146:1626): pid=5942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.165364 kernel: audit: type=1006 audit(1707507037.146:1627): pid=5942 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1
Feb  9 19:30:37.170436 systemd-logind[1552]: New session 26 of user core.
Feb  9 19:30:37.171517 systemd[1]: Started session-26.scope.
Feb  9 19:30:37.146000 audit[5942]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd653aa3d0 a2=3 a3=0 items=0 ppid=1 pid=5942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:37.146000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:37.183366 kernel: audit: type=1300 audit(1707507037.146:1627): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd653aa3d0 a2=3 a3=0 items=0 ppid=1 pid=5942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:37.183570 kernel: audit: type=1327 audit(1707507037.146:1627): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:37.188000 audit[5942]: USER_START pid=5942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.205817 kernel: audit: type=1105 audit(1707507037.188:1628): pid=5942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.206145 kernel: audit: type=1103 audit(1707507037.191:1629): pid=5944 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.191000 audit[5944]: CRED_ACQ pid=5944 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.433868 sshd[5942]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:37.434000 audit[5942]: USER_END pid=5942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.438145 systemd[1]: sshd@25-172.31.21.113:22-139.178.68.195:59162.service: Deactivated successfully.
Feb  9 19:30:37.439783 systemd[1]: session-26.scope: Deactivated successfully.
Feb  9 19:30:37.442553 systemd-logind[1552]: Session 26 logged out. Waiting for processes to exit.
Feb  9 19:30:37.435000 audit[5942]: CRED_DISP pid=5942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.443917 systemd-logind[1552]: Removed session 26.
Feb  9 19:30:37.451087 kernel: audit: type=1106 audit(1707507037.434:1630): pid=5942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.451321 kernel: audit: type=1104 audit(1707507037.435:1631): pid=5942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:37.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.113:22-139.178.68.195:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:40.672285 systemd[1]: run-containerd-runc-k8s.io-cd35bce6c6b91eb8b65979efac4163371c7be9f6d3d67f85ab5285ff63d31f3a-runc.tGtKPb.mount: Deactivated successfully.
Feb  9 19:30:41.607607 systemd[1]: run-containerd-runc-k8s.io-c7dc58e3a7d9da6ccfa6447b32e298131fb5b635d5d0e39c8f8fe22fc00b5a67-runc.V6yPG5.mount: Deactivated successfully.
Feb  9 19:30:41.695194 kubelet[2906]: I0209 19:30:41.695126    2906 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-d4455d86c-rj6cb" podStartSLOduration=-9.2233720051694e+09 pod.CreationTimestamp="2024-02-09 19:30:10 +0000 UTC" firstStartedPulling="2024-02-09 19:30:12.356174994 +0000 UTC m=+122.787171602" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:30:18.497277542 +0000 UTC m=+128.928274170" watchObservedRunningTime="2024-02-09 19:30:41.685377495 +0000 UTC m=+152.116374122"
Feb  9 19:30:41.778000 audit[6022]: NETFILTER_CFG table=filter:142 family=2 entries=7 op=nft_register_rule pid=6022 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:41.778000 audit[6022]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff05c67420 a2=0 a3=7fff05c6740c items=0 ppid=3117 pid=6022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:41.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:41.784000 audit[6022]: NETFILTER_CFG table=nat:143 family=2 entries=205 op=nft_register_chain pid=6022 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:41.784000 audit[6022]: SYSCALL arch=c000003e syscall=46 success=yes exit=70436 a0=3 a1=7fff05c67420 a2=0 a3=7fff05c6740c items=0 ppid=3117 pid=6022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:41.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:41.836000 audit[6048]: NETFILTER_CFG table=filter:144 family=2 entries=6 op=nft_register_rule pid=6048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:41.836000 audit[6048]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffff5507ce0 a2=0 a3=7ffff5507ccc items=0 ppid=3117 pid=6048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:41.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:41.842000 audit[6048]: NETFILTER_CFG table=nat:145 family=2 entries=212 op=nft_register_chain pid=6048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 19:30:41.842000 audit[6048]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffff5507ce0 a2=0 a3=7ffff5507ccc items=0 ppid=3117 pid=6048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:41.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 19:30:42.467293 systemd[1]: Started sshd@26-172.31.21.113:22-139.178.68.195:59178.service.
Feb  9 19:30:42.477045 kernel: kauditd_printk_skb: 13 callbacks suppressed
Feb  9 19:30:42.478006 kernel: audit: type=1130 audit(1707507042.467:1637): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.113:22-139.178.68.195:59178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:42.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.113:22-139.178.68.195:59178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:42.639000 audit[6050]: USER_ACCT pid=6050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.640179 sshd[6050]: Accepted publickey for core from 139.178.68.195 port 59178 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:42.646759 kernel: audit: type=1101 audit(1707507042.639:1638): pid=6050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.647000 audit[6050]: CRED_ACQ pid=6050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.648560 sshd[6050]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:42.658350 kernel: audit: type=1103 audit(1707507042.647:1639): pid=6050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.658474 kernel: audit: type=1006 audit(1707507042.647:1640): pid=6050 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1
Feb  9 19:30:42.660277 systemd[1]: Started session-27.scope.
Feb  9 19:30:42.662404 kernel: audit: type=1300 audit(1707507042.647:1640): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38723940 a2=3 a3=0 items=0 ppid=1 pid=6050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:42.647000 audit[6050]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38723940 a2=3 a3=0 items=0 ppid=1 pid=6050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:42.661746 systemd-logind[1552]: New session 27 of user core.
Feb  9 19:30:42.647000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:42.674026 kernel: audit: type=1327 audit(1707507042.647:1640): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:42.674139 kernel: audit: type=1105 audit(1707507042.671:1641): pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.671000 audit[6050]: USER_START pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.672000 audit[6052]: CRED_ACQ pid=6052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.688707 kernel: audit: type=1103 audit(1707507042.672:1642): pid=6052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.945891 sshd[6050]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:42.947000 audit[6050]: USER_END pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.951418 systemd-logind[1552]: Session 27 logged out. Waiting for processes to exit.
Feb  9 19:30:42.954440 systemd[1]: sshd@26-172.31.21.113:22-139.178.68.195:59178.service: Deactivated successfully.
Feb  9 19:30:42.955564 systemd[1]: session-27.scope: Deactivated successfully.
Feb  9 19:30:42.957719 kernel: audit: type=1106 audit(1707507042.947:1643): pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.958175 systemd-logind[1552]: Removed session 27.
Feb  9 19:30:42.947000 audit[6050]: CRED_DISP pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:42.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.113:22-139.178.68.195:59178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:42.964727 kernel: audit: type=1104 audit(1707507042.947:1644): pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:47.872479 systemd[1]: run-containerd-runc-k8s.io-ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1-runc.ny9xSK.mount: Deactivated successfully.
Feb  9 19:30:47.980571 systemd[1]: Started sshd@27-172.31.21.113:22-139.178.68.195:50226.service.
Feb  9 19:30:47.990482 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:30:47.990919 kernel: audit: type=1130 audit(1707507047.980:1646): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.21.113:22-139.178.68.195:50226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:47.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.21.113:22-139.178.68.195:50226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:48.205000 audit[6080]: USER_ACCT pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.207563 sshd[6080]: Accepted publickey for core from 139.178.68.195 port 50226 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:48.211000 audit[6080]: CRED_ACQ pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.214675 sshd[6080]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:48.219382 kernel: audit: type=1101 audit(1707507048.205:1647): pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.219513 kernel: audit: type=1103 audit(1707507048.211:1648): pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.224827 kernel: audit: type=1006 audit(1707507048.211:1649): pid=6080 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1
Feb  9 19:30:48.211000 audit[6080]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd819a4310 a2=3 a3=0 items=0 ppid=1 pid=6080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:48.211000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:48.242392 kernel: audit: type=1300 audit(1707507048.211:1649): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd819a4310 a2=3 a3=0 items=0 ppid=1 pid=6080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:48.242524 kernel: audit: type=1327 audit(1707507048.211:1649): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:48.244728 systemd-logind[1552]: New session 28 of user core.
Feb  9 19:30:48.245965 systemd[1]: Started session-28.scope.
Feb  9 19:30:48.254000 audit[6080]: USER_START pid=6080 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.277811 kernel: audit: type=1105 audit(1707507048.254:1650): pid=6080 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.278000 audit[6086]: CRED_ACQ pid=6086 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.289743 kernel: audit: type=1103 audit(1707507048.278:1651): pid=6086 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.684144 sshd[6080]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:48.685000 audit[6080]: USER_END pid=6080 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.693764 kernel: audit: type=1106 audit(1707507048.685:1652): pid=6080 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.685000 audit[6080]: CRED_DISP pid=6080 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.697900 systemd[1]: sshd@27-172.31.21.113:22-139.178.68.195:50226.service: Deactivated successfully.
Feb  9 19:30:48.698957 systemd[1]: session-28.scope: Deactivated successfully.
Feb  9 19:30:48.702603 kernel: audit: type=1104 audit(1707507048.685:1653): pid=6080 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:48.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.21.113:22-139.178.68.195:50226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:48.701853 systemd-logind[1552]: Session 28 logged out. Waiting for processes to exit.
Feb  9 19:30:48.703457 systemd-logind[1552]: Removed session 28.
Feb  9 19:30:48.831772 systemd[1]: run-containerd-runc-k8s.io-cd35bce6c6b91eb8b65979efac4163371c7be9f6d3d67f85ab5285ff63d31f3a-runc.ou1LXu.mount: Deactivated successfully.
Feb  9 19:30:53.719391 systemd[1]: Started sshd@28-172.31.21.113:22-139.178.68.195:50232.service.
Feb  9 19:30:53.730247 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:30:53.730383 kernel: audit: type=1130 audit(1707507053.719:1655): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.21.113:22-139.178.68.195:50232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:53.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.21.113:22-139.178.68.195:50232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:53.923000 audit[6120]: USER_ACCT pid=6120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:53.928755 sshd[6120]: Accepted publickey for core from 139.178.68.195 port 50232 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:53.934710 kernel: audit: type=1101 audit(1707507053.923:1656): pid=6120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:53.934000 audit[6120]: CRED_ACQ pid=6120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:53.936086 sshd[6120]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:53.944568 systemd[1]: Started session-29.scope.
Feb  9 19:30:53.945890 kernel: audit: type=1103 audit(1707507053.934:1657): pid=6120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:53.945986 kernel: audit: type=1006 audit(1707507053.934:1658): pid=6120 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1
Feb  9 19:30:53.934000 audit[6120]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea9ce08f0 a2=3 a3=0 items=0 ppid=1 pid=6120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:53.947934 systemd-logind[1552]: New session 29 of user core.
Feb  9 19:30:53.953804 kernel: audit: type=1300 audit(1707507053.934:1658): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea9ce08f0 a2=3 a3=0 items=0 ppid=1 pid=6120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:53.953925 kernel: audit: type=1327 audit(1707507053.934:1658): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:53.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:53.960103 kernel: audit: type=1105 audit(1707507053.955:1659): pid=6120 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:53.955000 audit[6120]: USER_START pid=6120 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:53.956000 audit[6122]: CRED_ACQ pid=6122 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:53.969379 kernel: audit: type=1103 audit(1707507053.956:1660): pid=6122 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:54.170544 sshd[6120]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:54.172000 audit[6120]: USER_END pid=6120 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:54.172000 audit[6120]: CRED_DISP pid=6120 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:54.183915 systemd[1]: sshd@28-172.31.21.113:22-139.178.68.195:50232.service: Deactivated successfully.
Feb  9 19:30:54.185068 systemd[1]: session-29.scope: Deactivated successfully.
Feb  9 19:30:54.187242 kernel: audit: type=1106 audit(1707507054.172:1661): pid=6120 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:54.187334 kernel: audit: type=1104 audit(1707507054.172:1662): pid=6120 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:54.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.21.113:22-139.178.68.195:50232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:54.187743 systemd-logind[1552]: Session 29 logged out. Waiting for processes to exit.
Feb  9 19:30:54.188832 systemd-logind[1552]: Removed session 29.
Feb  9 19:30:59.200062 systemd[1]: Started sshd@29-172.31.21.113:22-139.178.68.195:52062.service.
Feb  9 19:30:59.209928 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:30:59.210047 kernel: audit: type=1130 audit(1707507059.200:1664): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.21.113:22-139.178.68.195:52062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:59.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.21.113:22-139.178.68.195:52062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:59.371000 audit[6135]: USER_ACCT pid=6135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.372624 sshd[6135]: Accepted publickey for core from 139.178.68.195 port 52062 ssh2: RSA SHA256:GHAJPA0rhDETsByFcTyupDZcq0222yHvHmNgynv4laE
Feb  9 19:30:59.380000 audit[6135]: CRED_ACQ pid=6135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.382979 sshd[6135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 19:30:59.390292 kernel: audit: type=1101 audit(1707507059.371:1665): pid=6135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.390659 kernel: audit: type=1103 audit(1707507059.380:1666): pid=6135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.391161 kernel: audit: type=1006 audit(1707507059.381:1667): pid=6135 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1
Feb  9 19:30:59.396464 systemd-logind[1552]: New session 30 of user core.
Feb  9 19:30:59.381000 audit[6135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeaebc480 a2=3 a3=0 items=0 ppid=1 pid=6135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:59.397886 systemd[1]: Started session-30.scope.
Feb  9 19:30:59.406024 kernel: audit: type=1300 audit(1707507059.381:1667): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeaebc480 a2=3 a3=0 items=0 ppid=1 pid=6135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:30:59.406144 kernel: audit: type=1327 audit(1707507059.381:1667): proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:59.381000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 19:30:59.407000 audit[6135]: USER_START pid=6135 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.416284 kernel: audit: type=1105 audit(1707507059.407:1668): pid=6135 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.416419 kernel: audit: type=1103 audit(1707507059.411:1669): pid=6137 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.411000 audit[6137]: CRED_ACQ pid=6137 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.691611 sshd[6135]: pam_unix(sshd:session): session closed for user core
Feb  9 19:30:59.692000 audit[6135]: USER_END pid=6135 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.692000 audit[6135]: CRED_DISP pid=6135 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.707034 kernel: audit: type=1106 audit(1707507059.692:1670): pid=6135 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.707164 kernel: audit: type=1104 audit(1707507059.692:1671): pid=6135 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 19:30:59.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.21.113:22-139.178.68.195:52062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:30:59.705149 systemd[1]: sshd@29-172.31.21.113:22-139.178.68.195:52062.service: Deactivated successfully.
Feb  9 19:30:59.706288 systemd[1]: session-30.scope: Deactivated successfully.
Feb  9 19:30:59.707560 systemd-logind[1552]: Session 30 logged out. Waiting for processes to exit.
Feb  9 19:30:59.708653 systemd-logind[1552]: Removed session 30.
Feb  9 19:31:04.345000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:04.347388 kernel: kauditd_printk_skb: 1 callbacks suppressed
Feb  9 19:31:04.347518 kernel: audit: type=1400 audit(1707507064.345:1673): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:04.345000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012255c0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:04.361433 kernel: audit: type=1300 audit(1707507064.345:1673): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012255c0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:04.361588 kernel: audit: type=1327 audit(1707507064.345:1673): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:04.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:04.348000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:04.372934 kernel: audit: type=1400 audit(1707507064.348:1674): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:04.373077 kernel: audit: type=1300 audit(1707507064.348:1674): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010e4800 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:04.348000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010e4800 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:04.348000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:04.386155 kernel: audit: type=1327 audit(1707507064.348:1674): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:06.309000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:06.309000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:06.322768 kernel: audit: type=1400 audit(1707507066.309:1675): avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:06.322928 kernel: audit: type=1400 audit(1707507066.309:1676): avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:06.309000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c009eb2930 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:31:06.331999 kernel: audit: type=1300 audit(1707507066.309:1675): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c009eb2930 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:31:06.332150 kernel: audit: type=1327 audit(1707507066.309:1675): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:31:06.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:31:06.309000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:06.309000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c009eb29c0 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:31:06.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:31:06.310000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:06.310000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00183df40 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:31:06.310000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:31:06.310000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:06.310000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c009eb2a20 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:31:06.310000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:31:06.309000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022b4cc0 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:31:06.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:31:06.311000 audit[2760]: AVC avc:  denied  { watch } for  pid=2760 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:06.311000 audit[2760]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0084cbf20 a2=fc6 a3=0 items=0 ppid=2597 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c735 key=(null)
Feb  9 19:31:06.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 19:31:09.368000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:09.371138 kernel: kauditd_printk_skb: 14 callbacks suppressed
Feb  9 19:31:09.371253 kernel: audit: type=1400 audit(1707507069.368:1681): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:09.368000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011180c0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:09.398769 kernel: audit: type=1300 audit(1707507069.368:1681): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011180c0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:09.399162 kernel: audit: type=1327 audit(1707507069.368:1681): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:09.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:09.379000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:09.423916 kernel: audit: type=1400 audit(1707507069.379:1682): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:09.424164 kernel: audit: type=1300 audit(1707507069.379:1682): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010e4c80 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:09.379000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010e4c80 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:09.379000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:09.444793 kernel: audit: type=1327 audit(1707507069.379:1682): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:09.444941 kernel: audit: type=1400 audit(1707507069.385:1683): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:09.385000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:09.385000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011180e0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:09.460916 kernel: audit: type=1300 audit(1707507069.385:1683): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011180e0 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:09.461078 kernel: audit: type=1327 audit(1707507069.385:1683): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:09.385000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:09.446000 audit[2787]: AVC avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:09.476715 kernel: audit: type=1400 audit(1707507069.446:1684): avc:  denied  { watch } for  pid=2787 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:09.446000 audit[2787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010e5040 a2=fc6 a3=0 items=0 ppid=2624 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:09.446000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:11.412182 systemd[1]: Started sshd@30-172.31.21.113:22-104.250.34.226:34502.service.
Feb  9 19:31:11.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.21.113:22-104.250.34.226:34502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:31:12.424653 sshd[6150]: Invalid user temp2 from 104.250.34.226 port 34502
Feb  9 19:31:12.436920 sshd[6150]: pam_faillock(sshd:auth): User unknown
Feb  9 19:31:12.438077 sshd[6150]: pam_unix(sshd:auth): check pass; user unknown
Feb  9 19:31:12.438124 sshd[6150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.34.226
Feb  9 19:31:12.438675 sshd[6150]: pam_faillock(sshd:auth): User unknown
Feb  9 19:31:12.438000 audit[6150]: USER_AUTH pid=6150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="temp2" exe="/usr/sbin/sshd" hostname=104.250.34.226 addr=104.250.34.226 terminal=ssh res=failed'
Feb  9 19:31:13.321151 kubelet[2906]: E0209 19:31:13.320655    2906 controller.go:189] failed to update lease, error: Put "https://172.31.21.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-113?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)
Feb  9 19:31:14.353557 systemd[1]: cri-containerd-fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c.scope: Deactivated successfully.
Feb  9 19:31:14.353915 systemd[1]: cri-containerd-fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c.scope: Consumed 3.662s CPU time.
Feb  9 19:31:14.358000 audit: BPF prog-id=96 op=UNLOAD
Feb  9 19:31:14.358000 audit: BPF prog-id=109 op=UNLOAD
Feb  9 19:31:14.412634 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c-rootfs.mount: Deactivated successfully.
Feb  9 19:31:14.421365 env[1569]: time="2024-02-09T19:31:14.421312597Z" level=info msg="shim disconnected" id=fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c
Feb  9 19:31:14.421864 env[1569]: time="2024-02-09T19:31:14.421515424Z" level=warning msg="cleaning up after shim disconnected" id=fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c namespace=k8s.io
Feb  9 19:31:14.421864 env[1569]: time="2024-02-09T19:31:14.421549885Z" level=info msg="cleaning up dead shim"
Feb  9 19:31:14.438751 env[1569]: time="2024-02-09T19:31:14.438670095Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:31:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6184 runtime=io.containerd.runc.v2\n"
Feb  9 19:31:14.548395 kernel: kauditd_printk_skb: 6 callbacks suppressed
Feb  9 19:31:14.548576 kernel: audit: type=1334 audit(1707507074.544:1689): prog-id=129 op=UNLOAD
Feb  9 19:31:14.544000 audit: BPF prog-id=129 op=UNLOAD
Feb  9 19:31:14.544814 systemd[1]: cri-containerd-fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92.scope: Deactivated successfully.
Feb  9 19:31:14.545268 systemd[1]: cri-containerd-fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92.scope: Consumed 7.298s CPU time.
Feb  9 19:31:14.549000 audit: BPF prog-id=132 op=UNLOAD
Feb  9 19:31:14.552775 kernel: audit: type=1334 audit(1707507074.549:1690): prog-id=132 op=UNLOAD
Feb  9 19:31:14.577339 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92-rootfs.mount: Deactivated successfully.
Feb  9 19:31:14.579422 env[1569]: time="2024-02-09T19:31:14.579368752Z" level=info msg="shim disconnected" id=fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92
Feb  9 19:31:14.579841 env[1569]: time="2024-02-09T19:31:14.579425163Z" level=warning msg="cleaning up after shim disconnected" id=fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92 namespace=k8s.io
Feb  9 19:31:14.579841 env[1569]: time="2024-02-09T19:31:14.579440193Z" level=info msg="cleaning up dead shim"
Feb  9 19:31:14.590308 env[1569]: time="2024-02-09T19:31:14.590252903Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:31:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6210 runtime=io.containerd.runc.v2\n"
Feb  9 19:31:14.667505 sshd[6150]: Failed password for invalid user temp2 from 104.250.34.226 port 34502 ssh2
Feb  9 19:31:14.697757 kubelet[2906]: I0209 19:31:14.697727    2906 scope.go:115] "RemoveContainer" containerID="fada5fe2bce94adcafaf0a1045c936f57ea414ef27b29c0d743cf1271c545d92"
Feb  9 19:31:14.699414 kubelet[2906]: I0209 19:31:14.698883    2906 scope.go:115] "RemoveContainer" containerID="fda418da9b6b9555f4acc561272cda7d3daed702ce562c514639a95681b1de2c"
Feb  9 19:31:14.703359 env[1569]: time="2024-02-09T19:31:14.703316794Z" level=info msg="CreateContainer within sandbox \"fc9a6e19ddea057136545b44dda724e72e8be2a797c9561ae56448eaea55a170\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}"
Feb  9 19:31:14.704527 env[1569]: time="2024-02-09T19:31:14.704111542Z" level=info msg="CreateContainer within sandbox \"e2f910e1a8668111b5104e27986996a75e7d9f46c8749ea7a345623377cb4236\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}"
Feb  9 19:31:14.734822 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount207847499.mount: Deactivated successfully.
Feb  9 19:31:14.746185 env[1569]: time="2024-02-09T19:31:14.746127102Z" level=info msg="CreateContainer within sandbox \"fc9a6e19ddea057136545b44dda724e72e8be2a797c9561ae56448eaea55a170\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"17b44c05fd6653e6ada7ebcf1e523d1676a5bb92801a0a4c9ff15d3dc6f6711e\""
Feb  9 19:31:14.748256 env[1569]: time="2024-02-09T19:31:14.748200368Z" level=info msg="StartContainer for \"17b44c05fd6653e6ada7ebcf1e523d1676a5bb92801a0a4c9ff15d3dc6f6711e\""
Feb  9 19:31:14.749962 env[1569]: time="2024-02-09T19:31:14.749887277Z" level=info msg="CreateContainer within sandbox \"e2f910e1a8668111b5104e27986996a75e7d9f46c8749ea7a345623377cb4236\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"3f5a33532c651437d010eca291bad5f0e1f2be4af90e214e0a4364cf2322b0fa\""
Feb  9 19:31:14.750732 env[1569]: time="2024-02-09T19:31:14.750703668Z" level=info msg="StartContainer for \"3f5a33532c651437d010eca291bad5f0e1f2be4af90e214e0a4364cf2322b0fa\""
Feb  9 19:31:14.780085 systemd[1]: Started cri-containerd-17b44c05fd6653e6ada7ebcf1e523d1676a5bb92801a0a4c9ff15d3dc6f6711e.scope.
Feb  9 19:31:14.790167 systemd[1]: Started cri-containerd-3f5a33532c651437d010eca291bad5f0e1f2be4af90e214e0a4364cf2322b0fa.scope.
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.824613 kernel: audit: type=1400 audit(1707507074.813:1691): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.824848 kernel: audit: type=1400 audit(1707507074.813:1692): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.832769 kernel: audit: type=1400 audit(1707507074.813:1693): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.833164 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Feb  9 19:31:14.833308 kernel: audit: type=1400 audit(1707507074.813:1694): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.833355 kernel: audit: type=1400 audit(1707507074.813:1695): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.833389 kernel: audit: type=1400 audit(1707507074.813:1696): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.833423 kernel: audit: type=1400 audit(1707507074.813:1697): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.813000 audit: BPF prog-id=200 op=LOAD
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2624 pid=6238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623434633035666436363533653661646137656263663165353233
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2624 pid=6238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623434633035666436363533653661646137656263663165353233
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit: BPF prog-id=201 op=LOAD
Feb  9 19:31:14.825000 audit[6238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000fd690 items=0 ppid=2624 pid=6238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623434633035666436363533653661646137656263663165353233
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit: BPF prog-id=202 op=LOAD
Feb  9 19:31:14.825000 audit[6238]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000fd6d8 items=0 ppid=2624 pid=6238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623434633035666436363533653661646137656263663165353233
Feb  9 19:31:14.825000 audit: BPF prog-id=202 op=UNLOAD
Feb  9 19:31:14.825000 audit: BPF prog-id=201 op=UNLOAD
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { perfmon } for  pid=6238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit[6238]: AVC avc:  denied  { bpf } for  pid=6238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.825000 audit: BPF prog-id=203 op=LOAD
Feb  9 19:31:14.825000 audit[6238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000fdae8 items=0 ppid=2624 pid=6238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623434633035666436363533653661646137656263663165353233
Feb  9 19:31:14.826000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.826000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.826000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.826000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.826000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.826000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.850000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.850000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.850000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.850000 audit: BPF prog-id=204 op=LOAD
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3016 pid=6239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366356133333533326336353134333764303130656361323931626164
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3016 pid=6239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366356133333533326336353134333764303130656361323931626164
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit: BPF prog-id=205 op=LOAD
Feb  9 19:31:14.851000 audit[6239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003ca3e0 items=0 ppid=3016 pid=6239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366356133333533326336353134333764303130656361323931626164
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit: BPF prog-id=206 op=LOAD
Feb  9 19:31:14.851000 audit[6239]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003ca428 items=0 ppid=3016 pid=6239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366356133333533326336353134333764303130656361323931626164
Feb  9 19:31:14.851000 audit: BPF prog-id=206 op=UNLOAD
Feb  9 19:31:14.851000 audit: BPF prog-id=205 op=UNLOAD
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { perfmon } for  pid=6239 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit[6239]: AVC avc:  denied  { bpf } for  pid=6239 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:14.851000 audit: BPF prog-id=207 op=LOAD
Feb  9 19:31:14.851000 audit[6239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ca838 items=0 ppid=3016 pid=6239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:14.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366356133333533326336353134333764303130656361323931626164
Feb  9 19:31:14.885217 env[1569]: time="2024-02-09T19:31:14.885165290Z" level=info msg="StartContainer for \"3f5a33532c651437d010eca291bad5f0e1f2be4af90e214e0a4364cf2322b0fa\" returns successfully"
Feb  9 19:31:14.923656 env[1569]: time="2024-02-09T19:31:14.923571024Z" level=info msg="StartContainer for \"17b44c05fd6653e6ada7ebcf1e523d1676a5bb92801a0a4c9ff15d3dc6f6711e\" returns successfully"
Feb  9 19:31:15.476871 sshd[6150]: Received disconnect from 104.250.34.226 port 34502:11: Bye Bye [preauth]
Feb  9 19:31:15.476871 sshd[6150]: Disconnected from invalid user temp2 104.250.34.226 port 34502 [preauth]
Feb  9 19:31:15.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.21.113:22-104.250.34.226:34502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 19:31:15.477924 systemd[1]: sshd@30-172.31.21.113:22-104.250.34.226:34502.service: Deactivated successfully.
Feb  9 19:31:16.445000 audit[6261]: AVC avc:  denied  { watch } for  pid=6261 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:16.445000 audit[6261]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000059080 a2=fc6 a3=0 items=0 ppid=2624 pid=6261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:16.445000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:16.447000 audit[6261]: AVC avc:  denied  { watch } for  pid=6261 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 19:31:16.447000 audit[6261]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e82040 a2=fc6 a3=0 items=0 ppid=2624 pid=6261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c562,c952 key=(null)
Feb  9 19:31:16.447000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 19:31:17.874528 systemd[1]: run-containerd-runc-k8s.io-ab4a3a6bb57716805c155653f668ef94187c5c55a14d235000916d6b3709bdb1-runc.YQXiTS.mount: Deactivated successfully.
Feb  9 19:31:19.901867 kernel: kauditd_printk_skb: 115 callbacks suppressed
Feb  9 19:31:19.902060 kernel: audit: type=1400 audit(1707507079.896:1729): avc:  denied  { watch } for  pid=5715 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_30_11.1680994519/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c478,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c478,c675 tclass=file permissive=0
Feb  9 19:31:19.896000 audit[5715]: AVC avc:  denied  { watch } for  pid=5715 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_30_11.1680994519/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c478,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c478,c675 tclass=file permissive=0
Feb  9 19:31:19.896000 audit[5715]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001bba300 a2=fc6 a3=0 items=0 ppid=5579 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c478,c675 key=(null)
Feb  9 19:31:19.914891 kernel: audit: type=1300 audit(1707507079.896:1729): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001bba300 a2=fc6 a3=0 items=0 ppid=5579 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c478,c675 key=(null)
Feb  9 19:31:19.915261 kernel: audit: type=1327 audit(1707507079.896:1729): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C
Feb  9 19:31:19.896000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C
Feb  9 19:31:20.105045 systemd[1]: cri-containerd-778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57.scope: Deactivated successfully.
Feb  9 19:31:20.106588 systemd[1]: cri-containerd-778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57.scope: Consumed 1.319s CPU time.
Feb  9 19:31:20.110000 audit: BPF prog-id=92 op=UNLOAD
Feb  9 19:31:20.110000 audit: BPF prog-id=110 op=UNLOAD
Feb  9 19:31:20.115222 kernel: audit: type=1334 audit(1707507080.110:1730): prog-id=92 op=UNLOAD
Feb  9 19:31:20.115282 kernel: audit: type=1334 audit(1707507080.110:1731): prog-id=110 op=UNLOAD
Feb  9 19:31:20.146811 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57-rootfs.mount: Deactivated successfully.
Feb  9 19:31:20.148369 env[1569]: time="2024-02-09T19:31:20.148311770Z" level=info msg="shim disconnected" id=778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57
Feb  9 19:31:20.149066 env[1569]: time="2024-02-09T19:31:20.148371590Z" level=warning msg="cleaning up after shim disconnected" id=778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57 namespace=k8s.io
Feb  9 19:31:20.149066 env[1569]: time="2024-02-09T19:31:20.148385457Z" level=info msg="cleaning up dead shim"
Feb  9 19:31:20.161284 env[1569]: time="2024-02-09T19:31:20.160285595Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:31:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6355 runtime=io.containerd.runc.v2\n"
Feb  9 19:31:20.729486 kubelet[2906]: I0209 19:31:20.729406    2906 scope.go:115] "RemoveContainer" containerID="778364097f1b89be18da5a26ecc37ee64fe3b6b44e9aff105e1f3f999e996e57"
Feb  9 19:31:20.732879 env[1569]: time="2024-02-09T19:31:20.732769024Z" level=info msg="CreateContainer within sandbox \"dfb8208553edb07695aa55f0ce31403f32811945e74dd1238032fcdb42dcf61e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}"
Feb  9 19:31:20.766718 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1493964747.mount: Deactivated successfully.
Feb  9 19:31:20.778573 env[1569]: time="2024-02-09T19:31:20.778334676Z" level=info msg="CreateContainer within sandbox \"dfb8208553edb07695aa55f0ce31403f32811945e74dd1238032fcdb42dcf61e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"d482cc9e3d89637313196a3b386d692ed73acdf01e6a953fbe8a4e76b6b81c25\""
Feb  9 19:31:20.779568 env[1569]: time="2024-02-09T19:31:20.779535443Z" level=info msg="StartContainer for \"d482cc9e3d89637313196a3b386d692ed73acdf01e6a953fbe8a4e76b6b81c25\""
Feb  9 19:31:20.804422 systemd[1]: Started cri-containerd-d482cc9e3d89637313196a3b386d692ed73acdf01e6a953fbe8a4e76b6b81c25.scope.
Feb  9 19:31:20.838818 kernel: audit: type=1400 audit(1707507080.827:1732): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.839164 kernel: audit: type=1400 audit(1707507080.827:1733): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.850408 kernel: audit: type=1400 audit(1707507080.827:1734): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.850515 kernel: audit: type=1400 audit(1707507080.827:1735): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.850548 kernel: audit: type=1400 audit(1707507080.827:1736): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.827000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.827000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit: BPF prog-id=208 op=LOAD
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2651 pid=6375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:20.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383263633965336438393633373331333139366133623338366436
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2651 pid=6375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:20.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383263633965336438393633373331333139366133623338366436
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.828000 audit: BPF prog-id=209 op=LOAD
Feb  9 19:31:20.828000 audit[6375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000394520 items=0 ppid=2651 pid=6375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:20.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383263633965336438393633373331333139366133623338366436
Feb  9 19:31:20.832000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.832000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.832000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.832000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.832000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.832000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.832000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.832000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.832000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.832000 audit: BPF prog-id=210 op=LOAD
Feb  9 19:31:20.832000 audit[6375]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000394568 items=0 ppid=2651 pid=6375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:20.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383263633965336438393633373331333139366133623338366436
Feb  9 19:31:20.838000 audit: BPF prog-id=210 op=UNLOAD
Feb  9 19:31:20.838000 audit: BPF prog-id=209 op=UNLOAD
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { perfmon } for  pid=6375 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit[6375]: AVC avc:  denied  { bpf } for  pid=6375 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 19:31:20.838000 audit: BPF prog-id=211 op=LOAD
Feb  9 19:31:20.838000 audit[6375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000394978 items=0 ppid=2651 pid=6375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 19:31:20.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383263633965336438393633373331333139366133623338366436
Feb  9 19:31:20.921271 env[1569]: time="2024-02-09T19:31:20.921218637Z" level=info msg="StartContainer for \"d482cc9e3d89637313196a3b386d692ed73acdf01e6a953fbe8a4e76b6b81c25\" returns successfully"
Feb  9 19:31:23.323978 kubelet[2906]: E0209 19:31:23.323857    2906 controller.go:189] failed to update lease, error: Put "https://172.31.21.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-113?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)
Feb  9 19:31:33.330567 kubelet[2906]: E0209 19:31:33.330445    2906 controller.go:189] failed to update lease, error: Put "https://172.31.21.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-113?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)