ed systemd-hostnamed.service. Starting polkit.service... [ OK ] Started polkit.service. [ OK ] Finished coreos-metadata-sshkeys@core.service. 2024/02/12 22:01:28Z: Amazon SSM Agent v2.3.1319.0 is running 2024/02/12 22:01:28Z: OsProductName: Flatcar Container Linux by Kinvolk 2024/02/12 22:01:28Z: OsVersion: 3510.3.2 [ OK ] Finished prepare-helm.service. [ OK ] Finished prepare-critools.service. [ OK ] Finished prepare-cni-plugins.service. [ OK ] Finished sshd-keygen.service. Starting issuegen.service... [ OK ] Finished issuegen.service. Starting systemd-user-sessions.service... [ OK ] Finished systemd-user-sessions.service. [ OK ] Started getty@tty1.service. [ OK ] Started serial-getty@ttyS0.service. [ OK ] Reached target getty.target. [ OK ] Reached target multi-user.target. Starting systemd-update-utmp-runlevel.service... [ OK ] Finished systemd-update-utmp-runlevel.service. This is ip-172-31-21-247 (Linux x86_64 5.15.148-flatcar) 22:01:31 SSH host key: SHA256:Jl5xp4b6g29NeVcrUdiNF8jnLXH1ujqrpNLNf3mduYY (ED25519) SSH host key: SHA256:9Xamy6J6W/LqvXmXOPfuSDKqgyLylvxugKgfymwA5ls (ECDSA) SSH host key: SHA256:e/uVwV7VwjWr/j5zoxizRNUrWtGR8iynJD/l+X9wJCE (RSA) eth0: 172.31.21.247 fe80::486:3dff:fec2:d9ed ip-172-31-21-247 login: [ 31.315539] kauditd_printk_skb: 185 callbacks suppressed [ 31.315542] audit: type=1305 audit(1707775298.916:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 31.321052] audit: type=1300 audit(1707775298.916:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcbda4aac0 a2=420 a3=0 items=0 ppid=1 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 31.329481] audit: type=1327 audit(1707775298.916:166): proctitle=2F7362696E2F617564697463746C002D44 [ 31.337489] audit: type=1131 audit(1707775298.919:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 31.366759] audit: type=1130 audit(1707775298.966:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 31.373013] audit: type=1106 audit(1707775298.972:169): pid=1879 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 31.378498] audit: type=1104 audit(1707775298.972:170): pid=1879 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 31.397206] audit: type=1106 audit(1707775298.997:171): pid=1876 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 31.427067] audit: type=1104 audit(1707775298.997:172): pid=1876 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 31.445407] audit: type=1131 audit(1707775299.008:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.247:22-139.178.89.65:39648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 33.184471] Initializing XFRM netlink socket This is ip-172-31-21-247 (Linux x86_64 5.15.148-flatcar) 22:01:41 SSH host key: SHA256:Jl5xp4b6g29NeVcrUdiNF8jnLXH1ujqrpNLNf3mduYY (ED25519) SSH host key: SHA256:9Xamy6J6W/LqvXmXOPfuSDKqgyLylvxugKgfymwA5ls (ECDSA) SSH host key: SHA256:e/uVwV7VwjWr/j5zoxizRNUrWtGR8iynJD/l+X9wJCE (RSA) eth0: 172.31.21.247 fe80::486:3dff:fec2:d9ed ip-172-31-21-247 login: [ 44.378765] kauditd_printk_skb: 292 callbacks suppressed [ 44.378769] audit: type=1130 audit(1707775311.978:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 44.387172] audit: type=1131 audit(1707775311.978:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 44.393025] audit: type=1130 audit(1707775311.980:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 44.463069] audit: type=1131 audit(1707775312.063:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 50.966177] audit: type=1131 audit(1707775318.563:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 50.990532] audit: type=1334 audit(1707775318.591:421): prog-id=54 op=UNLOAD [ 50.991990] audit: type=1334 audit(1707775318.591:422): prog-id=53 op=UNLOAD [ 50.993347] audit: type=1334 audit(1707775318.591:423): prog-id=52 op=UNLOAD [ 54.633104] audit: type=1130 audit(1707775322.233:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 54.653412] audit: type=1131 audit(1707775322.233:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 54.679483] audit: type=1130 audit(1707775322.241:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 55.059504] audit: type=1131 audit(1707775322.660:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 62.117337] audit: type=1130 audit(1707775329.717:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 62.129051] audit: type=1131 audit(1707775329.717:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 62.529495] audit: type=1400 audit(1707775330.130:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.534757] audit: type=1400 audit(1707775330.130:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.539505] audit: type=1400 audit(1707775330.130:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.543991] audit: type=1400 audit(1707775330.130:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.548925] audit: type=1400 audit(1707775330.130:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.550647] audit: audit_backlog=65 > audit_backlog_limit=64 [ 62.553692] audit: type=1400 audit(1707775330.130:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.554539] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 68.143100] kauditd_printk_skb: 639 callbacks suppressed [ 68.143103] audit: type=1400 audit(1707775335.743:684): avc: denied { watch } for pid=2537 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c873 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 68.160270] audit: type=1300 audit(1707775335.743:684): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0007ba000 a2=fc6 a3=0 items=0 ppid=2391 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c873 key=(null) [ 68.169295] audit: type=1327 audit(1707775335.743:684): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 68.176282] audit: type=1400 audit(1707775335.766:685): avc: denied { watch } for pid=2537 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c873 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 68.182294] audit: type=1300 audit(1707775335.766:685): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004181c0 a2=fc6 a3=0 items=0 ppid=2391 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c873 key=(null) [ 68.190475] audit: type=1327 audit(1707775335.766:685): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 68.906141] audit: type=1400 audit(1707775336.506:686): avc: denied { watch } for pid=2518 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c839 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 68.913765] audit: type=1400 audit(1707775336.506:687): avc: denied { watch } for pid=2518 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c839 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 68.919146] audit: type=1300 audit(1707775336.506:687): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007285a20 a2=fc6 a3=0 items=0 ppid=2351 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c839 key=(null) [ 68.926876] audit: type=1327 audit(1707775336.506:687): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 73.224613] kauditd_printk_skb: 280 callbacks suppressed [ 73.224616] audit: type=1400 audit(1707775340.825:944): avc: denied { mac_admin } for pid=2753 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 73.230676] audit: type=1401 audit(1707775340.825:944): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 73.233981] audit: type=1300 audit(1707775340.825:944): arch=c000003e syscall=188 success=no exit=-22 a0=c0012a6270 a1=c00130dce0 a2=c0012a6240 a3=25 items=0 ppid=1 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 73.252502] audit: type=1327 audit(1707775340.825:944): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 79.461796] audit: type=1106 audit(1707775347.061:945): pid=1909 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 79.467273] audit: type=1104 audit(1707775347.062:946): pid=1909 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 79.514293] audit: type=1106 audit(1707775347.114:947): pid=1906 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 79.542271] audit: type=1104 audit(1707775347.120:948): pid=1906 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 79.570964] audit: type=1131 audit(1707775347.170:949): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.247:22-139.178.89.65:39664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 84.768110] audit: type=1400 audit(1707775352.368:950): avc: denied { watch } for pid=2537 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c873 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 [ 84.774893] audit: type=1300 audit(1707775352.368:950): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012ebd40 a2=fc6 a3=0 items=0 ppid=2391 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c873 key=(null) [ 84.787792] audit: type=1327 audit(1707775352.368:950): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 86.692727] audit: type=1400 audit(1707775354.293:951): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.698038] audit: type=1400 audit(1707775354.293:952): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.704463] audit: type=1400 audit(1707775354.293:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.710583] audit: type=1400 audit(1707775354.293:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.717132] audit: type=1400 audit(1707775354.293:955): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.729405] audit: type=1400 audit(1707775354.293:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.735901] audit: type=1400 audit(1707775354.293:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.282666] kauditd_printk_skb: 309 callbacks suppressed [ 90.282668] audit: type=1400 audit(1707775357.883:1046): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.288395] audit: type=1400 audit(1707775357.883:1047): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.293335] audit: type=1400 audit(1707775357.883:1048): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.299395] audit: type=1400 audit(1707775357.883:1049): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.304846] audit: type=1400 audit(1707775357.883:1050): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.310398] audit: type=1400 audit(1707775357.883:1051): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.319357] audit: type=1400 audit(1707775357.883:1052): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.324689] audit: type=1400 audit(1707775357.883:1053): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.330062] audit: type=1400 audit(1707775357.883:1054): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.335832] audit: type=1400 audit(1707775357.893:1055): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.004519] kauditd_printk_skb: 179 callbacks suppressed [ 99.004522] audit: type=1400 audit(1707775366.604:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.027226] audit: type=1400 audit(1707775366.604:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.034791] audit: type=1400 audit(1707775366.604:1108): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.039324] audit: type=1400 audit(1707775366.604:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.043969] audit: type=1400 audit(1707775366.604:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.048780] audit: type=1400 audit(1707775366.604:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.060839] audit: type=1400 audit(1707775366.604:1112): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.066966] audit: type=1400 audit(1707775366.604:1113): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.073182] audit: type=1400 audit(1707775366.604:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.078349] audit: type=1400 audit(1707775366.605:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.155043] kauditd_printk_skb: 97 callbacks suppressed [ 111.155046] audit: type=1400 audit(1707775378.755:1133): avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.161402] audit: type=1300 audit(1707775378.755:1133): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7fdddc1c3188 items=0 ppid=3294 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 111.168998] audit: type=1327 audit(1707775378.755:1133): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363461303939613935383539386632343364353838393733386331 [ 111.179597] audit: type=1400 audit(1707775378.755:1134): avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.188850] audit: type=1400 audit(1707775378.755:1134): avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.196069] audit: type=1400 audit(1707775378.755:1134): avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.201592] audit: type=1400 audit(1707775378.755:1134): avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.207340] audit: type=1400 audit(1707775378.755:1134): avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.212059] audit: type=1400 audit(1707775378.755:1134): avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.217660] audit: type=1400 audit(1707775378.755:1134): avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.400030] kauditd_printk_skb: 34 callbacks suppressed [ 122.400033] audit: type=1400 audit(1707775390.001:1140): avc: denied { perfmon } for pid=3835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.422418] audit: type=1300 audit(1707775390.001:1140): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3d648a2648 items=0 ppid=3294 pid=3835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 122.440862] audit: type=1327 audit(1707775390.001:1140): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463356233363264326239653565376562346261346465646461333265 [ 122.452447] audit: type=1400 audit(1707775390.001:1141): avc: denied { bpf } for pid=3835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.461514] audit: type=1400 audit(1707775390.001:1141): avc: denied { bpf } for pid=3835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.470635] audit: type=1400 audit(1707775390.001:1141): avc: denied { bpf } for pid=3835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.478080] audit: type=1400 audit(1707775390.001:1141): avc: denied { perfmon } for pid=3835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.488045] audit: type=1400 audit(1707775390.001:1141): avc: denied { perfmon } for pid=3835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.495680] audit: type=1400 audit(1707775390.001:1141): avc: denied { perfmon } for pid=3835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.503494] audit: type=1400 audit(1707775390.001:1141): avc: denied { perfmon } for pid=3835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.661548] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 122.663102] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. [ 126.998897] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 127.000247] IPv6: ADDRCONF(NETDEV_CHANGE): calia86c49c7247: link becomes ready This is ip-172-31-21-247 (Linux x86_64 5.15.148-flatcar) 22:03:14 SSH host key: SHA256:Jl5xp4b6g29NeVcrUdiNF8jnLXH1ujqrpNLNf3mduYY (ED25519) SSH host key: SHA256:9Xamy6J6W/LqvXmXOPfuSDKqgyLylvxugKgfymwA5ls (ECDSA) SSH host key: SHA256:e/uVwV7VwjWr/j5zoxizRNUrWtGR8iynJD/l+X9wJCE (RSA) eth0: 172.31.21.247 fe80::486:3dff:fec2:d9ed ip-172-31-21-247 login: [ 127.642275] kauditd_printk_skb: 279 callbacks suppressed [ 127.642278] audit: type=1325 audit(1707775395.244:1217): table=filter:104 family=2 entries=14 op=nft_register_rule pid=4320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 127.647529] audit: type=1300 audit(1707775395.244:1217): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff3cc96700 a2=0 a3=7fff3cc966ec items=0 ppid=2896 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 127.655942] audit: type=1327 audit(1707775395.244:1217): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 127.660964] audit: type=1325 audit(1707775395.244:1218): table=nat:105 family=2 entries=14 op=nft_register_rule pid=4320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 127.665673] audit: type=1300 audit(1707775395.244:1218): arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff3cc96700 a2=0 a3=31030 items=0 ppid=2896 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 127.673090] audit: type=1327 audit(1707775395.244:1218): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 127.713130] IPv6: ADDRCONF(NETDEV_CHANGE): cali38a6885c920: link becomes ready [ 127.838698] audit: type=1325 audit(1707775395.441:1219): table=filter:106 family=2 entries=40 op=nft_register_chain pid=4357 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" [ 127.847448] audit: type=1300 audit(1707775395.441:1219): arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fffde92df20 a2=0 a3=7fffde92df0c items=0 ppid=3938 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 127.861876] audit: type=1327 audit(1707775395.441:1219): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 [ 127.894636] audit: type=1400 audit(1707775395.497:1220): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 128.609982] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 128.611391] IPv6: ADDRCONF(NETDEV_CHANGE): califa90ac62532: link becomes ready This is ip-172-31-21-247 (Linux x86_64 5.15.148-flatcar) 22:03:17 SSH host key: SHA256:Jl5xp4b6g29NeVcrUdiNF8jnLXH1ujqrpNLNf3mduYY (ED25519) SSH host key: SHA256:9Xamy6J6W/LqvXmXOPfuSDKqgyLylvxugKgfymwA5ls (ECDSA) SSH host key: SHA256:e/uVwV7VwjWr/j5zoxizRNUrWtGR8iynJD/l+X9wJCE (RSA) eth0: 172.31.21.247 fe80::486:3dff:fec2:d9ed ip-172-31-21-247 login: [ 130.001673] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 130.003962] IPv6: ADDRCONF(NETDEV_CHANGE): calif6171ac3ebe: link becomes ready This is ip-172-31-21-247 (Linux x86_64 5.15.148-flatcar) 22:03:18 SSH host key: SHA256:Jl5xp4b6g29NeVcrUdiNF8jnLXH1ujqrpNLNf3mduYY (ED25519) SSH host key: SHA256:9Xamy6J6W/LqvXmXOPfuSDKqgyLylvxugKgfymwA5ls (ECDSA) SSH host key: SHA256:e/uVwV7VwjWr/j5zoxizRNUrWtGR8iynJD/l+X9wJCE (RSA) eth0: 172.31.21.247 fe80::486:3dff:fec2:d9ed ip-172-31-21-247 login: This is ip-172-31-21-247 (Linux x86_64 5.15.148-flatcar) 22:03:19 SSH host key: SHA256:Jl5xp4b6g29NeVcrUdiNF8jnLXH1ujqrpNLNf3mduYY (ED25519) SSH host key: SHA256:9Xamy6J6W/LqvXmXOPfuSDKqgyLylvxugKgfymwA5ls (ECDSA) SSH host key: SHA256:e/uVwV7VwjWr/j5zoxizRNUrWtGR8iynJD/l+X9wJCE (RSA) eth0: 172.31.21.247 fe80::486:3dff:fec2:d9ed ip-172-31-21-247 login: This is ip-172-31-21-247 (Linux x86_64 5.15.148-flatcar) 22:03:20 SSH host key: SHA256:Jl5xp4b6g29NeVcrUdiNF8jnLXH1ujqrpNLNf3mduYY (ED25519) SSH host key: SHA256:9Xamy6J6W/LqvXmXOPfuSDKqgyLylvxugKgfymwA5ls (ECDSA) SSH host key: SHA256:e/uVwV7VwjWr/j5zoxizRNUrWtGR8iynJD/l+X9wJCE (RSA) eth0: 172.31.21.247 fe80::486:3dff:fec2:d9ed ip-172-31-21-247 login: [ 135.510733] kauditd_printk_skb: 335 callbacks suppressed [ 135.510736] audit: type=1130 audit(1707775403.114:1325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.247:22-139.178.89.65:53034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 135.544203] audit: type=1400 audit(1707775403.147:1326): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.550192] audit: type=1400 audit(1707775403.147:1327): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.556899] audit: type=1400 audit(1707775403.147:1328): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.565145] audit: type=1400 audit(1707775403.147:1329): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.572419] audit: type=1400 audit(1707775403.147:1330): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.584326] audit: type=1400 audit(1707775403.147:1331): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.594263] audit: type=1400 audit(1707775403.147:1332): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.603395] audit: type=1400 audit(1707775403.147:1333): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.610774] audit: type=1400 audit(1707775403.147:1334): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 141.355726] kauditd_printk_skb: 101 callbacks suppressed [ 141.355729] audit: type=1130 audit(1707775408.960:1358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.247:22-139.178.89.65:57794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 141.562850] audit: type=1101 audit(1707775409.167:1359): pid=5011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.570849] audit: type=1103 audit(1707775409.175:1360): pid=5011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.577411] audit: type=1006 audit(1707775409.175:1361): pid=5011 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 [ 141.587755] audit: type=1300 audit(1707775409.175:1361): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb9344950 a2=3 a3=0 items=0 ppid=1 pid=5011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 141.597327] audit: type=1327 audit(1707775409.175:1361): proctitle=737368643A20636F7265205B707269765D [ 141.600758] audit: type=1105 audit(1707775409.200:1362): pid=5011 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.607348] audit: type=1103 audit(1707775409.204:1363): pid=5013 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.912146] audit: type=1106 audit(1707775409.516:1364): pid=5011 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.924557] audit: type=1104 audit(1707775409.517:1365): pid=5011 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.439453] kauditd_printk_skb: 23 callbacks suppressed [ 148.439456] audit: type=1130 audit(1707775416.043:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.247:22-139.178.89.65:57824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 148.628224] audit: type=1101 audit(1707775416.232:1386): pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.636366] audit: type=1103 audit(1707775416.240:1387): pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.644731] audit: type=1006 audit(1707775416.240:1388): pid=5080 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 [ 148.648946] audit: type=1300 audit(1707775416.240:1388): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccb7499d0 a2=3 a3=0 items=0 ppid=1 pid=5080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 148.656807] audit: type=1327 audit(1707775416.240:1388): proctitle=737368643A20636F7265205B707269765D [ 148.676219] audit: type=1105 audit(1707775416.280:1389): pid=5080 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.687399] audit: type=1103 audit(1707775416.290:1390): pid=5103 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.900578] audit: type=1106 audit(1707775416.504:1391): pid=5080 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.909460] audit: type=1104 audit(1707775416.505:1392): pid=5080 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 153.932847] kauditd_printk_skb: 1 callbacks suppressed [ 153.932850] audit: type=1130 audit(1707775421.537:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.247:22-139.178.89.65:40386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 154.131420] audit: type=1101 audit(1707775421.737:1395): pid=5117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 154.142807] audit: type=1103 audit(1707775421.745:1396): pid=5117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 154.150833] audit: type=1006 audit(1707775421.745:1397): pid=5117 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 [ 154.155377] audit: type=1300 audit(1707775421.745:1397): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa60242e0 a2=3 a3=0 items=0 ppid=1 pid=5117 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 154.162252] audit: type=1327 audit(1707775421.745:1397): proctitle=737368643A20636F7265205B707269765D [ 154.177675] audit: type=1105 audit(1707775421.783:1398): pid=5117 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 154.188552] audit: type=1103 audit(1707775421.783:1399): pid=5119 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 154.440402] audit: type=1106 audit(1707775422.042:1400): pid=5117 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 154.456276] audit: type=1104 audit(1707775422.043:1401): pid=5117 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 159.460792] kauditd_printk_skb: 1 callbacks suppressed [ 159.460794] audit: type=1130 audit(1707775427.065:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.247:22-139.178.89.65:40402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 159.656614] audit: type=1101 audit(1707775427.261:1404): pid=5149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 159.663662] audit: type=1103 audit(1707775427.268:1405): pid=5149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 159.669246] audit: type=1006 audit(1707775427.268:1406): pid=5149 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 [ 159.672704] audit: type=1300 audit(1707775427.268:1406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4e02b6f0 a2=3 a3=0 items=0 ppid=1 pid=5149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 159.679177] audit: type=1327 audit(1707775427.268:1406): proctitle=737368643A20636F7265205B707269765D [ 159.690233] audit: type=1105 audit(1707775427.295:1407): pid=5149 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 159.697359] audit: type=1103 audit(1707775427.295:1408): pid=5151 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 159.934263] audit: type=1106 audit(1707775427.540:1409): pid=5149 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 159.946519] audit: type=1104 audit(1707775427.540:1410): pid=5149 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.961809] kauditd_printk_skb: 1 callbacks suppressed [ 164.961812] audit: type=1130 audit(1707775432.568:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.247:22-139.178.89.65:47598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 165.140257] audit: type=1101 audit(1707775432.746:1413): pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.151703] audit: type=1103 audit(1707775432.757:1414): pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.158366] audit: type=1006 audit(1707775432.757:1415): pid=5160 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 [ 165.161836] audit: type=1300 audit(1707775432.757:1415): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff0e63670 a2=3 a3=0 items=0 ppid=1 pid=5160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 165.169298] audit: type=1327 audit(1707775432.757:1415): proctitle=737368643A20636F7265205B707269765D [ 165.188127] audit: type=1105 audit(1707775432.794:1416): pid=5160 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.197183] audit: type=1103 audit(1707775432.803:1417): pid=5162 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.434674] audit: type=1106 audit(1707775433.041:1418): pid=5160 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.444795] audit: type=1104 audit(1707775433.042:1419): pid=5160 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 170.034299] kauditd_printk_skb: 54 callbacks suppressed [ 170.034301] audit: type=1106 audit(1707775437.640:1458): pid=5218 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 170.044130] audit: type=1104 audit(1707775437.641:1459): pid=5218 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 170.050063] audit: type=1131 audit(1707775437.650:1460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.247:22-139.178.89.65:47634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 175.078150] audit: type=1130 audit(1707775442.683:1461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.247:22-139.178.89.65:36574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 175.330262] audit: type=1101 audit(1707775442.936:1462): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.338321] audit: type=1103 audit(1707775442.944:1463): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.349355] audit: type=1006 audit(1707775442.944:1464): pid=5251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 [ 175.354689] audit: type=1300 audit(1707775442.944:1464): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2b0beff0 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 175.366428] audit: type=1327 audit(1707775442.944:1464): proctitle=737368643A20636F7265205B707269765D [ 175.371141] audit: type=1105 audit(1707775442.976:1465): pid=5251 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.382528] audit: type=1103 audit(1707775442.980:1466): pid=5253 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.659547] audit: type=1106 audit(1707775443.265:1467): pid=5251 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.673424] audit: type=1104 audit(1707775443.271:1468): pid=5251 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 180.687522] kauditd_printk_skb: 7 callbacks suppressed [ 180.687525] audit: type=1130 audit(1707775448.294:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.247:22-139.178.89.65:47394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 180.863463] audit: type=1101 audit(1707775448.470:1473): pid=5291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 180.870480] audit: type=1103 audit(1707775448.477:1474): pid=5291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 180.876241] audit: type=1006 audit(1707775448.477:1475): pid=5291 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 [ 180.879854] audit: type=1300 audit(1707775448.477:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed97a0080 a2=3 a3=0 items=0 ppid=1 pid=5291 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 180.899928] audit: type=1327 audit(1707775448.477:1475): proctitle=737368643A20636F7265205B707269765D [ 180.904321] audit: type=1105 audit(1707775448.504:1476): pid=5291 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 180.925164] audit: type=1103 audit(1707775448.507:1477): pid=5293 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 181.155892] audit: type=1106 audit(1707775448.763:1478): pid=5291 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 181.162927] audit: type=1104 audit(1707775448.764:1479): pid=5291 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 184.184897] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 184.186609] IPv6: ADDRCONF(NETDEV_CHANGE): cali3b509f795f7: link becomes ready [ 186.188998] kauditd_printk_skb: 73 callbacks suppressed [ 186.189008] audit: type=1130 audit(1707775453.795:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.247:22-139.178.89.65:47410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 186.517831] audit: type=1101 audit(1707775454.125:1505): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 186.526499] audit: type=1103 audit(1707775454.132:1506): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 186.536299] audit: type=1006 audit(1707775454.132:1507): pid=5386 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 [ 186.541264] audit: type=1300 audit(1707775454.132:1507): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6b2ba350 a2=3 a3=0 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 186.548377] audit: type=1327 audit(1707775454.132:1507): proctitle=737368643A20636F7265205B707269765D [ 186.565404] audit: type=1105 audit(1707775454.172:1508): pid=5386 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 186.574018] audit: type=1103 audit(1707775454.181:1509): pid=5388 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 186.952221] audit: type=1106 audit(1707775454.559:1510): pid=5386 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 186.978480] audit: type=1104 audit(1707775454.570:1511): pid=5386 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' This is ip-172-31-21-247 (Linux x86_64 5.15.148-flatcar) 22:04:14 SSH host key: SHA256:Jl5xp4b6g29NeVcrUdiNF8jnLXH1ujqrpNLNf3mduYY (ED25519) SSH host key: SHA256:9Xamy6J6W/LqvXmXOPfuSDKqgyLylvxugKgfymwA5ls (ECDSA) SSH host key: SHA256:e/uVwV7VwjWr/j5zoxizRNUrWtGR8iynJD/l+X9wJCE (RSA) eth0: 172.31.21.247 fe80::486:3dff:fec2:d9ed ip-172-31-21-247 login: [ 191.357868] kauditd_printk_skb: 91 callbacks suppressed [ 191.357871] audit: type=1325 audit(1707775458.965:1542): table=filter:126 family=2 entries=10 op=nft_register_rule pid=5441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 191.363664] audit: type=1300 audit(1707775458.965:1542): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe0edc2270 a2=0 a3=7ffe0edc225c items=0 ppid=2896 pid=5441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 191.372570] audit: type=1327 audit(1707775458.965:1542): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 191.376696] audit: type=1325 audit(1707775458.980:1543): table=nat:127 family=2 entries=44 op=nft_register_rule pid=5441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 191.380251] audit: type=1300 audit(1707775458.980:1543): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe0edc2270 a2=0 a3=7ffe0edc225c items=0 ppid=2896 pid=5441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 191.387303] audit: type=1327 audit(1707775458.980:1543): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 191.978701] audit: type=1130 audit(1707775459.586:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.247:22-139.178.89.65:46260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 192.209258] audit: type=1101 audit(1707775459.817:1545): pid=5443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 192.221666] audit: type=1103 audit(1707775459.819:1546): pid=5443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 192.251439] audit: type=1006 audit(1707775459.819:1547): pid=5443 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 [ 197.723540] kauditd_printk_skb: 19 callbacks suppressed [ 197.723542] audit: type=1130 audit(1707775465.330:1557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.247:22-139.178.89.65:46272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 197.900424] audit: type=1101 audit(1707775465.507:1558): pid=5459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 197.909286] audit: type=1103 audit(1707775465.515:1559): pid=5459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 197.918126] audit: type=1006 audit(1707775465.515:1560): pid=5459 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 [ 197.926824] audit: type=1300 audit(1707775465.515:1560): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14d434e0 a2=3 a3=0 items=0 ppid=1 pid=5459 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 197.936454] audit: type=1327 audit(1707775465.515:1560): proctitle=737368643A20636F7265205B707269765D [ 197.955620] audit: type=1105 audit(1707775465.563:1561): pid=5459 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 197.964446] audit: type=1103 audit(1707775465.566:1562): pid=5461 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 198.198974] audit: type=1106 audit(1707775465.805:1563): pid=5459 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 198.205596] audit: type=1104 audit(1707775465.806:1564): pid=5459 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'